Lesson #8 MCTS 70-680 Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Configuring Windows Internet Explorer 7 Security Lesson 5.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 18: Configuring Application Restriction Policies
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
16.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 16: Examining Software Update.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Microsoft ® Official Course Module 9 Configuring Applications.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Configuring and Troubleshooting Internet Access Chapter 9 powered by dj.
Using Windows Firewall and Windows Defender
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 9 User Productivity Tools.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Performing Software Installation with Group Policy Lesson 9.
Windows 7 Inside Out Ch 5: Adding, Removing, and Managing Programs.
Module 5: Configuring Internet Explorer and Supporting Applications.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Lesson 11: Configuring and Maintaining Network Security
11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
NetTech Solutions Security and Security Permissions Lesson Nine.
SOP PENGGUNAAN JUPEM2U.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 9 User Productivity Tools.
Lesson 6: Controlling Access to Local Hardware and Applications
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Network Security.
Guide to Parallel Operating Systems with Windows 7 and Linux Chapter 4 Installing and Configuring Applications.
Windows Tutorial 5 Protecting Your Computer
Chapter 1 Objectives Understand the History of Windows Over the Last 20-Plus Years. Compare and Contrast the Available Editions of Windows 7. Understand.
MANAGING SOFTWARE Chapter 9
Managing Windows Security
Introducing, Installing, and Upgrading Windows 7
Lesson 4: Web Browsing.
MOAC : Configuring Windows 8.1
Microsoft FrontPage 2003 Illustrated Complete
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Lesson 4: Web Browsing.
Securing Windows 7 Lesson 10.
Introduction to Group Policy
Operating System Hardening
Windows Vista Inside Out
Network Locations in Windows 7
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Lesson #8 MCTS 70-680 Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer

Chapter 8 Objectives Configuring Application Compatibility So Older Applications Work in Windows 7. Configure Application Restrictions to Limit What Software Can Run in Windows 7. Configure Internet Explorer for Secure Browsing Under Various Situations in Windows 7.

Configuring Application Compatibility Applications Developed for Windows 2000 or Windows XP May Not Run Properly in Windows 7. Generally Applications Written for Windows Vista Work in Windows 7. Applications May Stop Responding, Refuse to Start, or Not Run Properly. Application Compatibility Mode Emulates Environment on Older Windows Versions.

Application Compatibility Mode Compatibility Tab of an Application’s Properties Dialog Box: Review four-step process for application compatibility and the various options listed in the textbook in Table 8-2.

Application Compatibility Toolkit Downloadable Resource to Test Compatibility of Older Applications. Useful in Configuring Compatibility. SQL Server Database Retains Information on Compatibility Data. ACT is beyond the scope of the Certification Exam.

Internet Explorer Compatibility Issues Application Compatibility Toolkit Includes Internet Explorer Compatibility Test Tool. Tests Websites and Web-Based Applications in Internet Explorer Versions 7 and 8. Reports Potential Issues with Websites. Should Test with Version of Internet Explorer with Which Users Will View Websites.

Configuring Application Restrictions Application Restrictions Enable You to Limit Types of Software That Run on Computers to Which the Policy Applies. Can Be Set in Local Security Policy or Group Policy in a Domain. Software Restriction Policies Can be Used to Limit Application Installation. Application Control Policies Can Create Separate Rules for Windows Installer Files, Executables, and Script Files.

Benefits of Application Restriction Control Which Programs Can Run on Computers on Your Network. Control Which Programs Users on Multiuser Computers Can Run. Control Whether Software Restriction Policies Apply to All Users. Prevent Email Attachments from Executing.

Setting Software Restriction Policies Security Levels Are Disallowed, Basic User, and Unrestricted: Local Security and Group Policy both enable you to set software restriction policies and application control policies. You can now configure four types of new rules in the Additional Rules folder.

Application Control Policies AppLocker Allows You to Specify Exactly What Users Are Permitted to Run. AppLocker Defines Rules According to File Attributes; So, For Example, an Old Version of an Application Might Be Forbidden. Prevents Execution of Unlicensed or Unapproved Applications. Prevents Users from Running Applications That Needlessly Consume Bandwidth. Enables Users to Run Approved Applications and Software Updates While Maintaining Requirement That Only Administrative Users May Install Them. Specifies Rules That Apply to a User or Group. Ensures Computers in Compliance with Licensing and Corporate Requirements. Configuration of Applocker demonstrated in textbook. Additional features are mentioned. Can set specific rules on applications. Table 8-3 Compares AppLocker to Software Restriction Policies.

Configuring Internet Explorer Compatibility View Enables Websites Designed for Older Versions to Display Properly in Internet Explorer 8: Internet Explorer can be configured to add or remove websites displayed in Compatibility View. Group Policy can be used to configure Compatibility View in a Domain.

Configuring Internet Explorer You Can Establish Security Settings Separately to Each Type of Website: Security Settings are configured from the Internet Properties Dialog Box. The default zone is the Internet zone. Sites can be moved to other zones. Custom levels can be established.

Configuring Internet Explorer Individual Security Settings Apply to an Internet Zone:

Configuring Protected Mode Internet Explorer Protected Mode Provides Enhanced Levels of Security. Provides Protection from Malware. Prevents Websites from Modifying User or System Files or Downloading Unwanted Software. Prevents Internet Explorer from Writing Data to Any Location Except Temporary Internet Files Folder. Enabled by Default on All Internet Zones Except Trusted Sites. .

Configuring Internet Explorer SmartScreen Filter Turns Automatic Phishing Filter On or Off: Accessed from Safety menu.

Configuring Internet Explorer Privacy Tab for Configuring Cookie Settings and Pop-Up Blocker: Define cookies, and explain handling, and the levels provided on the Privacy tab. Pop-up Blocker Settings can allow pop-ups from certain websites.

Configuring Internet Explorer Content Tab Settings: Parental Controls. Content Advisor Controls Content Users Can View. Certificates Controls Behavior of Certificates Used for Encrypted Connections. Auto-Complete Stores Information and Tries to Complete Web Entries. Feeds and Web Slices Help Configure RSS Feeds.

Configuring Internet Explorer Configuring Providers: Default Search Provider is Bing. You can specify a different search provider or remove search providers from the Manage Add-ons dialog box.

Configuring Internet Explorer Add-Ons Are Optional Additional Features Providing Internet Explorer Additional Functionality. Sometimes Installed Without Your Knowledge. Can Be Viewed and Managed from the Manage Add-Ons Dialog. Options: All Add-Ons Lists All That Have Been Downloaded. Currently Loaded Add-Ons Displays Only Those Used by a Currently or Recently Viewed Web Page. Run Without Permissions Displays Pre-Approved Add-Ons. Downloaded Controls Displays 32-Bit ActiveX Controls Only.

Configuring Internet Explorer InPrivate Browsing: InPrivate Browsing opens new browser window isolated from items such as browser history and temporary Internet files. All tabs within the browser window are protected. Selected from Safety menu. Cookies, browsing history, information supplied on forms, and AutoComplete information are discarded when the session is over. InPrivate Filtering blocks third parties from receiving information on browsing activities.

Configuring Internet Explorer Certificates Dialog Box Displays Available Certificates: Certificates provide secure identification and verification, and protect user information sent across the Internet. These are considered secure websites.

Chapter 8: Summary Older Applications May Not Always Work in Windows 7. Application Compatibility Toolkit Can Test for Compatibility. Application Compatibility Mode Emulates Environment on Older Windows Versions. Application Restrictions Enable You to Limit Types of Software That Run on Computers to Which the Policy Applies. Internet Explorer Configurations Include Compatibility View, Settings for Zones, Protected Mode, and InPrivate Browsing, Next Lesson: Chapter 9, “Configuring TCP/IP”