Your final project will be to stimulate endpoint management: apply local security baselines, restrict user capabilities, schedule maintenance and AV scans, and verify with logs.
If you havent already done it last week,
- Download the to get started.
- Submit the .
Attached Files (PDF/DOCX): CMIT380 – Project 3 Template.docx, CMIT380 – Project 3.docx
Note: Content extraction from these files is restricted, please review them manually.

Leave a Reply
You must be logged in to post a comment.