100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Overig

WGU C769 Capstone Task 3: Identity Access & Endpoint Security in Unsecured Environments | Passed on First Attempt |Latest Update with Complete Solution

Beoordeling
-
Verkocht
-
Pagina's
29
Geüpload op
18-12-2025
Geschreven in
2025/2026

WGU C769 Capstone Task 3: Identity Access & Endpoint Security in Unsecured Environments | Passed on First Attempt |Latest Update with Complete Solution

Instelling
Vak










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
18 december 2025
Aantal pagina's
29
Geschreven in
2025/2026
Type
Overig
Persoon
Onbekend

Onderwerpen

Voorbeeld van de inhoud

1

WGU C769 Capstone Task 3: Identity Access & Endpoint Security in
Unsecured Environments | Passed on First Attempt |Latest Update with
Complete Solution




Implementing Identity Access Management and Endpoint Detection and Response in an

Unsecured Environment.

Stacy A. Woodard

Western Governors University

, 2

Table of Contents

Summary ....................................................................................................................................................... 3

Review of Other Work .................................................................................................................................. 6

Review Work 1.......................................................................................................................................... 6
Review Work 2.......................................................................................................................................... 6
Review Work 3.......................................................................................................................................... 7
Changes to the Project Environment ............................................................................................................. 8

Methodology ............................................................................................................................................... 10

Project Goals and Objectives....................................................................................................................... 13

Enhance Network Account Security.................................................................................................... 13
Install Endpoint Detection and Response ............................................................................................ 14
Implement Management of Privileged Accounts ................................................................................ 14
Project Timeline .......................................................................................................................................... 15

Unanticipated Requirements........................................................................................................................ 15

Conclusions ................................................................................................................................................. 16

Project Deliverables..................................................................................................................................... 17

References ................................................................................................................................................... 18

Appendix A ................................................................................................................................................. 19

MFA Account Enrollment Process.......................................................................................................... 19
Appendix B ................................................................................................................................................. 21

Privileged Account Management Policy ................................................................................................. 21

, 3

Summary

Empire Holdings, a privately-owned real estate company that has a significant presence along the

East Coast of the United States, recently underwent an acquisition by Moonrise Real Estate. In response

to this change, the company recognized the need to implement security controls to comply with the

changes in the policy on password complexity, account lockout, password aging, and the creation of a

privileged account management policy. Additionally, Moonrise Real Estate mandated the installation of

an endpoint detection and response (EDR) system on all company-owned computers and servers.



Upon conducting a security audit, several security issues were identified. The first issue pertained

to weak security around the network account login process. Specifically, all network accounts use single-

factor authentication, and Empire Holdings did not require user passwords to expire, nor were there any

minimum password length or complexity requirements in place. Furthermore, there was no user lockout

policy, which created an insecure network access environment.



The second issue identified in the security audit report was the lack of endpoint detection and

response software installed on company-owned computers and servers. The company relied on employees

to ensure that operating systems and software updates were installed on their computers, while the

DevOps team performed this function for servers. In response, Moonrise Real Estate mandated the

implementation of Cortex XDR to monitor the patching status of company-owned computers and servers,

providing a method for reporting on the level of risk in the environment.



The final security issue raised during the security audit review was the absence of management

controls for privileged accounts. At that time, there was no documented process to request a privileged

account, audit the use of these accounts, or specify who would be responsible for decommissioning these

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
professoraxel Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2361
Lid sinds
3 jaar
Aantal volgers
1569
Documenten
19282
Laatst verkocht
3 uur geleden
THE EASIEST WAY TO STUDY NURSING EXAMS,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS

Better grades start here! Find Study Notes, Exam answer packs, Assignment guided solutions and more. Study faster & better. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.....All the Best!!!!!!

3,8

447 beoordelingen

5
209
4
79
3
85
2
24
1
50

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen