30 truly interactive simulations — malware quarantine console, AD users & computers tree, Registry Editor, Windows backup wizard, Group Policy, BitLocker.
Sarah, Last name Jones, Full name auto-fills, User logon name sjones (UPN sjones@acme.local, downlevel ACME\sjones).TempP@ss2026!. Uncheck "Password never expires" (compliance requires periodic rotation). Check "User must change password at next logon".HR-Users security group.| Name | Type | Description |
|---|
regedit.exe to (1) remove a malicious Run-key autorun, (2) reset a tampered SecurityHealth setting that disabled real-time protection, and (3) remove a malicious Image File Execution Options entry that redirects taskmgr.exe to a payload. Each fix uses a different value type (REG_SZ, REG_DWORD, sub-key delete) and a different hive path.| Name | Type | Data |
|---|---|---|
| Select a key in the navigation pane to view its values. | ||
mara.patel@acme.onmicrosoft.com with 1 TB of OneDrive storage. The company's BYOD-replacement policy requires that her laptop:
D:\) hourly, retain forever10.0.5.20) is reachable from both the management subnet (10.0.0.0/24) and the Internet. Compliance demands that RDP (TCP/3389) be reachable only from the management subnet, and that all inbound RDP traffic from anywhere else is dropped. The administrator wants you to add the rule via the local firewall console (no GPO), then prove it works by simulating inbound packets from three different source IPs.| Name | Group | Profile | Enabled | Action | Protocol | Local Port | Remote Address |
|---|
vendor-demo.exe. The screen darkened and the User Account Control consent prompt appeared. The user is unsure whether to click Yes or No. You walk her through the prompt and the underlying setting that controls whether and when these prompts appear.Choose when to be notified about changes to your computer.
C:\Users\…\AppData\Local\Temp is a red flag).svchost.exe or explorer.exe destabilises the OS.acme.local. You're already logged into a DC with GPMC. The Default Domain Policy is open in the editor. You must navigate the policy tree to the right node, double-click each setting, fill the configured value, then run gpupdate /force against a member workstation to verify the policy actually applies.Computer Configuration → Policies → Windows Settings → Security Settings → Account Policies → Password Policy / Account Lockout Policy. Use Local Policies → Audit Policy for the audit setting.14, Password must meet complexity = Enabled, Account lockout threshold = 5 invalid attempts, Audit logon events = Success, Failure.PS C:\Users\admin> _
Get-Process, Get-Service, Get-EventLog, Test-Connection, Get-ChildItem.C:\Windows\Minidump\ off the disk to your analysis VM, and load the .dmp in WinDbg Preview.For more information about this issue and possible fixes, visit https://www.windows.com/stopcode
If you call a support person, give them this info:
Stop code: DRIVER_IRQL_NOT_LESS_OR_EQUAL
What failed: nvlddmkm.sys
/Library/Logs/DiagnosticReports/. You open Console.app to inspect the panic log.Received:, Authentication-Results:, and SPF/DKIM/DMARC headers.Dear Valued Customer,
Our security system has detected suspicious sign-in activity on your account. You have only 24 hours to verify your identity before your account is permanently closed.
To confirm your account ownership, please verify your password and credit card on file by clicking the secure link below:
https://login.microsoft0nline.com/verify?id=8a92ee3f&sess=acme.com
If you do not act within 12 hours, all data on your account will be permanently deleted and you will be billed a $99 reactivation fee.
Sincerely,
The Microsoft / Office 365 IT Helpdesk Security Team
--
This message has been scanned for viruses. (footer faked)