100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

WGU C769 Capstone Task 3: Identity Access & Endpoint Security in Unsecured Environments | Passed on First Attempt |Latest Update with Complete Solution

Rating
-
Sold
-
Pages
29
Uploaded on
18-12-2025
Written in
2025/2026

WGU C769 Capstone Task 3: Identity Access & Endpoint Security in Unsecured Environments | Passed on First Attempt |Latest Update with Complete Solution











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 18, 2025
Number of pages
29
Written in
2025/2026
Type
Other
Person
Unknown

Subjects

Content preview

1

WGU C769 Capstone Task 3: Identity Access & Endpoint Security in
Unsecured Environments | Passed on First Attempt |Latest Update with
Complete Solution




Implementing Identity Access Management and Endpoint Detection and Response in an

Unsecured Environment.

Stacy A. Woodard

Western Governors University

, 2

Table of Contents

Summary ....................................................................................................................................................... 3

Review of Other Work .................................................................................................................................. 6

Review Work 1.......................................................................................................................................... 6
Review Work 2.......................................................................................................................................... 6
Review Work 3.......................................................................................................................................... 7
Changes to the Project Environment ............................................................................................................. 8

Methodology ............................................................................................................................................... 10

Project Goals and Objectives....................................................................................................................... 13

Enhance Network Account Security.................................................................................................... 13
Install Endpoint Detection and Response ............................................................................................ 14
Implement Management of Privileged Accounts ................................................................................ 14
Project Timeline .......................................................................................................................................... 15

Unanticipated Requirements........................................................................................................................ 15

Conclusions ................................................................................................................................................. 16

Project Deliverables..................................................................................................................................... 17

References ................................................................................................................................................... 18

Appendix A ................................................................................................................................................. 19

MFA Account Enrollment Process.......................................................................................................... 19
Appendix B ................................................................................................................................................. 21

Privileged Account Management Policy ................................................................................................. 21

, 3

Summary

Empire Holdings, a privately-owned real estate company that has a significant presence along the

East Coast of the United States, recently underwent an acquisition by Moonrise Real Estate. In response

to this change, the company recognized the need to implement security controls to comply with the

changes in the policy on password complexity, account lockout, password aging, and the creation of a

privileged account management policy. Additionally, Moonrise Real Estate mandated the installation of

an endpoint detection and response (EDR) system on all company-owned computers and servers.



Upon conducting a security audit, several security issues were identified. The first issue pertained

to weak security around the network account login process. Specifically, all network accounts use single-

factor authentication, and Empire Holdings did not require user passwords to expire, nor were there any

minimum password length or complexity requirements in place. Furthermore, there was no user lockout

policy, which created an insecure network access environment.



The second issue identified in the security audit report was the lack of endpoint detection and

response software installed on company-owned computers and servers. The company relied on employees

to ensure that operating systems and software updates were installed on their computers, while the

DevOps team performed this function for servers. In response, Moonrise Real Estate mandated the

implementation of Cortex XDR to monitor the patching status of company-owned computers and servers,

providing a method for reporting on the level of risk in the environment.



The final security issue raised during the security audit review was the absence of management

controls for privileged accounts. At that time, there was no documented process to request a privileged

account, audit the use of these accounts, or specify who would be responsible for decommissioning these

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
professoraxel Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
2361
Member since
3 year
Number of followers
1569
Documents
19282
Last sold
1 hour ago
THE EASIEST WAY TO STUDY NURSING EXAMS,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS

Better grades start here! Find Study Notes, Exam answer packs, Assignment guided solutions and more. Study faster & better. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.....All the Best!!!!!!

3.8

447 reviews

5
209
4
79
3
85
2
24
1
50

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions