This document is about the investigation of the system security for a virtual machine (VM). It includes the installation of VM ware image file, description of the investigation process, results, and proposal for securing the system. The document also discusses the vulnerabilities and threats faced by the system and suggests measures to minimize them.