Overview
In this scenario-based lab, you will review and analyze a systems application whitelist, compare current system application configurations to approved whitelisted applications, determine if the systems in your control are configured in accordance with policy, and remove unapproved applications.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs