Cyber Security

1.To maintain data security, it’s important to ensure that users do not receive

1.To maintain data security, it’s important to ensure that users do not receive access to folders and files that they should not have access to in their job role. In larger Windows environments, keeping track of the permissions assigned to shared folders and NTFS/ReFS folders and files can be a complex task.As a result, there are many free and paid tools that can be used to monitor the permissions assigned to resources, including the Solarwinds Permissions Analyzer. Note the features and usage of this tool at
Next, use a search engine, such as Google, to research two additional permission monitoring tools for Windows Server.
Write a post of at least 100 words comparing and contrasting the features of each of the three tools. Also note which tool you would choose to use in your own Windows Server environment and why.
2. Scenario: You have learned how SMB and NFS can be used to provide secure access to files on an NTFS or ReFS filesystem, as well as how quotas and file screens can further restrict filesystem access. You’ve also learned how auditing can record file system access, and DFS can be used to both provide centralized access to multiple filesystems, as well as replicate filesystem contents.
Read the scenario.
Write a report of at least 100 words outlining your answers to the following questions
What filesystems and file sharing protocols would you use and why?
How would you ensure that only authorized developers are allowed to access the files that they need?
How would you configure fault tolerance for developer files?