Discussion Post Assignments | Online Homework Help


Don't use plagiarized sources. Get Your Assignment on
Discussion Post Assignments | Online Homework Help
Just from $13/Page
Order Now

Auditing is the process of evaluating the objects to determine if they meet the security standards. Object can be anything it can be the user, process, organization, and a thing. The collection of this information over a period of time is compared against the standard information to determine if the system has breached the security standards or not.

In Computer environment, security audit is referred to comparing the configuration and performance information over the standard or baseline security policy to ensure that the computer complies with the security policies. In general, baseline is nothing but the collection of configuration settings. Security baseline is referred to as the collection of security settings. The configuration and performance information are collected through the log files. Security audit is very important as it makes the system comply with the security standards, reduce data breaches, reduce the risk of unauthorized access and any unnecessary changes to the system. It also helps to rollback the system from unnecessary changes.

The common windows security process includes the following activities:

· Collecting information

· Creating baselines

· Identifying configuration changes

· Analyze changes

· Verify compliance with security policy

professional writing services near me

Microsoft provides Microsoft Security Compliance Toolkit to obtain security configuration baselines for windows. The main system activities useful for logging are logon and logoff events, Active Directory changes, Registry changes, server access and logins, account management and policy changes. These events can be used by the system administrator to determine if the environment or OS is reaching the baseline. Once a baseline is breached, it is important that we know the root cause behind the breach and document the precautions. Rollback is performed.


· Solomon, M. G. (2014). Security Strategies in Windows Platforms and Applications ; Second Edition. Jones and Bartlett Learning.

· DulceMontemayor. (n.d.). Windows security baselines. Retrieved from https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-security-baselines

· What is Windows Auditing? (n.d.). Retrieved from https://www.beyondtrust.com/resources/glossary/windows-auditing


I want 250 words explanation on this paragraph with 3 reference, your sentence must be start from, I like your post, I would like to add some more details on your discussion..


Windows auditing is known to be file integrity monitoring sometimes., which helps to detect the changes within the systems, SQL, files systems and Active directories. By Windows auditing the organizations will be complaint based on the protection of data and other threat requirements or unwanted changes which will reduce the risks of the data breach in any organization. These auditing tools help in the rollback of changes with desirable configuration.

Through the windows security and auditing one will understand the events that they want to log. For instance, when the audit policy says the employee needs to log any kind of remote access to their system or machine, but you might not need to do it on the business premises. Auditing will generate more volume of data; it pays off the important information that one needs to gather security policy decisions.

Any organization that are related to financial ,health or government sectors face threats. They differ from each other based on the type of organization . One thing which any organization has a common motive is to protect their devices and the information in them. They are set to have security standards that the organization have set to them. Baseline security group has recommended config settings which are based on Microsoft security engineering teams, customers, groups and partners.

These are needed by an organization because they bring in expertise in knowledge of customers  ,partners from Microsoft. Each security config settings have their own impact.( Andres Mariano Gorzelany 2018).In modern companies or organizations security threats have been increasing vastly day by day .The policy makers need to keep them in mind along with the security threats and help them change the settings so that they can avoid the risks and data breaches. To make all of this easier by managing windows, Microsoft provides security baselines which are in consumable formats which are known as Group Policy Object backups.

If an environment is not reaching a baseline one should make sure that further action needs to be taken care and the security configuration settings need to be applied and implemented by the company.


1.Liza Poggemeyer ,Andres Mariano Gorzelanny ( June 2018)., Windows security baselines.,’

2.Mark Beblow., (March 11,2019).,Audting Microsoft Security Compliance Baselines

3.    Windows Auditing   https://www.beyondtrust.com/resources/glossary/windows-auditing


I want 250 words explanation on this paragraph with 3 references, your sentence must be started from, I like your post, I would like to add some more details on your discussion.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Homework Writing Services
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
thank you so much
Customer 453933, January 25th, 2020
Health Care
Thank you!
Customer 454001, March 11th, 2020
The work is of really good quality and was finished on time.
Customer 454439, June 15th, 2020
Excellent work
Customer 456821, February 26th, 2022
Thank you for your work. Some sentences required minimal edits for clarification/explanation. In the future, please review your sentences for clarity and readability. Consider also reading out loud before submitting. We look forward to future contributions.
Customer 463469, October 21st, 2022
Super professional and highly qualified. Excellent customer service.
Customer 462485, May 29th, 2022
Accounting & Finance
Good blog design and content.
Customer 452441, April 15th, 2022
excellent work
Customer 456821, November 1st, 2022
English 101
Thank you!
Customer 454351, May 9th, 2020
Business and administrative studies
Great content.
Customer 462275, April 4th, 2022
English 101
I wish the writer would have picked a more natural topic. Although the work is good, it is obvious that the writer of the material is African American. The fact that I am not African American raises questions.
Customer 462899, April 26th, 2022
Business and administrative studies
Always format your paper as instructed.
Customer 458115, April 7th, 2022
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat