8.7.8 Lab - Configure Security Features in Windows and Linux
8.7.8 Lab - Configure Security Features in Windows and Linux
Objectives
Part 1: Update Windows and Linux
Part 2: Windows Local Security Policy
Part 3: Configure Firewall Rules
Part 4: Install and Run Applications
Required Resources
= 1 Windows 10 PC
= This CSE-LABVM virtual machine
= Internet access
Background / Scenario
In this lab, you will update both Windows and Linux systems. You will configure local security policy and
configure firewall rules in Windows. In Linux, you will install two applications: chkrootkit and lynis.
Instructions
Step 1: Verify connectivity between the CSE-LABVM and the Windows host computer.
In this step, you will verify connectivity to the internet so that you can download updates. Furthermore, you will
verify connectivity between CSE-LABVM and Windows PC so that you can perform tasks later in this lab.
a. Before launching the CSE-LABVM, select it and then choose Settings > Network. For Adapter 1,
change the Attached to: option to Bridged Adapter. You can then choose the adapter. Many computers
have two adapters: one for wireless networks and the other for wired networks. Choose the one your
computer is using to connect to the internet.
b. Launch the CSE-LABVM and wait for it to boot.
c. On the CSE-LABVM, open a terminal and enter ip address to determine its IP address.
d. On your Windows host computer, open a command prompt and enter ipconfig to determine its IP
address.
Question:
2017 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 7
e. From the respective command prompts, ping a website of your choice to verify that the Windows host and
CSE-LABVM can reach the internet.
f. Verify that the Windows host can ping the CSE-LABVM.
g. From CSE-LABVM, attempt to ping the Windows host. The CSE-LABVM may not be able to ping the
Windows host because of the default firewall settings in Windows. You will modify the firewall rule later in
this lab to allow the pings through the Windows Firewall. Press CTRL-C to stop the pings if necessary.
When was the last time the system checked for updates?
Type your answers here.
What are your current active hours? What will Windows do outside the active hours?
Type your answers here.
2017 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 7
example, the majorgeeks.com website has an excellent tutorial. If you are not allowed or would prefer not to
change the Local Security Policy on you Windows host, read through this part and move on to the next part.
a. Navigate to the Local Security Policy by first searching for and opening the Control Panel.
b. Click Administrative Tools > Search for Local Security Policy.
c. Open Local Security Policy.
Question:
Note: The Store passwords using reversible encryption security setting should always be disabled.
Storing passwords using reversible encryption is essentially the same as storing plaintext versions of the
2017 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 7
passwords. For this reason, this policy should never be enabled unless application requirements outweigh
the need to protect password information.
g. Double-click each of the policies and set the values according to your entries in the table above.
How long should the user have to wait before attempting to log back in?
Type your answers here.
How many times is a user allowed to attempt to login before the account is locked?
Type your answers here.
2017 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 7
Step 1: Investigate Windows Defender Firewall
a. From the Start Menu, Search for and open Windows Defender Firewall. The default state for the
Windows Firewall is On.
Note: If you are using a Windows PC that is administered by an organization, you may see the message,
For you security, some settings are managed by your system administrator.
Question:
Step 2: Configure the Advanced Security features in Windows Firewall to allow echo requests.
Note: This step may not be allowed by your organization's security policy.
In this step, you will create an inbound rule that will allow echo request packets through the firewall.
a. In the left panel of the Windows Defender Firewall, click Advanced settings.
b. In the Windows Defender Firewall with Advanced Security on Local Computer, you can configure
Inbound Rules, Outbound Rules, or Connection Security Rules. You can also click Monitoring to view the
status of configured rules.
c. Click Inbound Rules, and then in the Actions pane, click New Rule.
d. In the New Inbound Rule Wizard, select Custom, and then click Next twice. You should now be at the
Protocol and Ports step.
e. For Protocol type, select ICMPv4, and then click Customize.
f. In the Customize ICMP Settings window, select Specific ICMP types, select Echo Request, and then
Click OK.
g. Click Next three times. You should now be at the Profile step.
h. Deselect Public so the Windows PC will not respond to an echo request in a public network location,
such as an internet cafe. Click Next to continue.
i. Provide a name for the new inbound rule that gives a good description of the rule and click Finish. You
should now see your rule at the top of the list of Inbound Rules in the Windows Defender Firewall with
Advanced Security dialog window.
j. Now the rule has created and enabled. Verify that CSE-LABVM can ping the Windows host and receive
replies.
2017 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 7
Part 4: Install and Run Applications
In this part, you will install two new applications on CSE-LABVM: chkrootkit and lynis. The application
chkrootkit will be downloaded from a software repository. However, we will add a new repository so we can
install lynis, provided by CISOfy.
b. Copy and paste the following command into a terminal to add the lynis repository maintained by CISOfy.
cisco@labvm:~$ echo "deb https://packages.cisofy.com/community/lynis/deb/
stable main" | sudo tee /etc/apt/sources.list.d/cisofy-lynis.list
deb https://packages.cisofy.com/community/lynis/deb/ stable main
c. Perform an update after adding a new repository. At the prompt, enter sudo apt-get update.
2017 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 7
d. Use the command apt install to install Lynis.
cisco@labvm:~$ sudo apt install lynis
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
lynis
0 upgraded, 1 newly installed, 0 to remove and 17 not upgraded.
Need to get 0 B/262 kB of archives.
After this operation, 1,681 kB of additional disk space will be used.
Selecting previously unselected package lynis.
(Reading database ... 205787 files and directories currently installed.)
Preparing to unpack .../lynis_3.0.6-100_all.deb ...
Unpacking lynis (3.0.6-100) ...
Setting up lynis (3.0.6-100) ...
Processing triggers for man-db (2.9.1-1) ...
Question:
g. You can run sudo apt-get update and sudo apt-get upgrade again to ensure that you have all the latest
updates from CISOfy.
end of document
2017 - 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 7