Your deliverable must use the provided MS Word template file (contact your instructor for formatting guidance if you cannot use this file). The required procedures are described below.
This procedure will instruct incident responders in the use of the Windows Defender anti-virus application to detect and analyze threats and attacks against Windows 10 endpoint devices.
Investigate the use of Windows Defender AV to detect and analyze potential viruses, spyware, and other forms of malware. Your investigation should include researching best practices for configuring and using the scanning, detection, and analysis capabilities for this host-based anti-malware software. At a minimum, your research should address the following
Update requirements for anti-virus definition files
Configuration requirements to enable real-time scanning
Procedures for conducting full system scans
Fast or quick scan for high vulnerability areas of the system
Removable media scanning
Reviewing scan results including reviewing any quarantined files or detected malware
Identify how the tool could be used during the incident response and recovery process (it may be useful in more than one phase). Typical uses include:
Detecting malware at the point of entry to the system (e.g. in an email message or web page)
Detecting intrusion attempts in real-time
Analyzing files and file systems to detect and identify malware
Quarantining files suspected of carrying threat payloads
Deleting Infected Files
Scanning removable media
Reviewing Windows Event Log entries to find relevant ID’s and incident reporting information
This procedure will instruct incident responders in the use of the Windows Defender SmartScreen application to detect and prevent threats and attacks against Windows 10 endpoint devices.
Identify how the Smart Screen tool could be used during the incident response and recovery process (it may be useful in more than one phase). Typical uses include:
Detect and block known bad websites
Detect and block know bad application downloads and installation attempts
Detect and report suspicious websites, web pages, and file downloads
Reviewing Windows Event Log entries (generated by SmartScreen) to find relevant ID’s and incident reporting information
Write a guidance document that identifies the tool, explains the capabilities it provides, and then lists and briefly describes the recommended uses as documented by Microsoft (2017a, 2017b, 2017, c, 2017d). Add a list of resources that can be consulted for additional information. Next, summarize the procedures required to perform the tasks listed under item b.1 (do not provide step-by-step instructions). Close your guidance document with a Notes / Warnings / Restrictions section that answers the question “Is there anything else the incident responder needs to be aware of when using or configuring this tool?”