Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Configuring Windows Internet Explorer 7 Security Lesson 5.
Module 5: Configuring Access for Remote Clients and Networks.
Microsoft Windows Vista Chapter 6 Customizing Your Computer Using the Control Panel.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Lesson 19: Configuring Windows Firewall
Performing Software Installation with Group Policy
File sharing. Connect the two win 7 systems with LAN card Open the network.
Ch 9 Managing Active Directory User Accounts. Objectives Create Organizational Unit Creating User Accounts in Active Directory Disabling, Enabling, and.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Configuring Active Directory Certificate Services Lesson 13.
Configuring Task Scheduler Lesson 9. Skills Matrix Technology SkillObjective Domain SkillDomain # Understanding Task Scheduler Configure and manage the.
Windows Tutorial 9 Maintaining Hardware and Software
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Guide to MCSE , Second Edition, Enhanced 1 Objectives Understand and use the Control Panel applets Describe the versatility of the Microsoft Management.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Using Windows Firewall and Windows Defender
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Configuring Windows Vista Applications Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Configuring Internet Explorer 7 Configure Windows.
Ch 8. The Control Panel Window –Category View The Control Panel Window –Small icons View.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Working with Mobile Computers Lesson 12. Skills Matrix Technology SkillObjective DomainObjective # Configuring Vista Wireless Networking Use the Network.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Using Group Policy Lesson 4. Skills Matrix Technology SkillObjective Domain SkillDomain # Creating and Understanding Group Policy Modeling and Group Policy.
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
1/28/2010 Network Plus Windows Networking Network Identification Identifies name and type of network. Installed adapters –Performed during Windows installation.
Introducing Windows Vista Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Understanding Windows Vista System Requirements Identify.
IS 2101—FALL 2009 Chapter 6 Getting Started with Windows Vista 9/22/08 and 9/24/08 9/21/09 1 IS Fall 2009.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
Configuring System Settings Lesson 3. Skills Matrix Technology SkillObjective DomainObjective # Introducing Windows AeroConfigure and troubleshoot Windows.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Microsoft Access 2010 Chapter 10 Administering a Database System.
1 Part-1 Chap 5 Configuring Accounts Definitions.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Lesson 11: Configuring and Maintaining Network Security
Working with Active Directory Sites Lesson 3. Skills Matrix Technology SkillObjective DomainObjective # Introducing Active Directory Sites Configure sites2.3.
Working with Disks Lesson 4. Skills Matrix Technology SkillObjective DomainObjective # Configuring Data Protection Configure data protection6.4 Using.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Lecture 12 Windows Firewall and Action Center. Firewalls Protect networks by stopping network traffic from passing through it Implemented as either a.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
Optimizing Windows Vista Performance Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Introducing ReadyBoostTroubleshoot performance.
Managing File Resource Using File Server Resource Manager Chapter 9 Advance Computer Network Lecture Sorn Pisey
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Fixing Windows 10 Automatic Updates Install Problem
Windows Vista Configuration MCTS : Network Security.
Pasewark & Pasewark 1 Windows Vista Lesson 1 Windows Vista Basics Microsoft Office 2007: Introductory.
Windows Tutorial 5 Protecting Your Computer
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Managing Windows Security
Configuring Windows 10 for Your Studio
Configuring System Settings
1. Press the Power button or switch to flip on the printer, if it is turn off. 2. From the Home display screen on the product control panel, click the.
Installing the HP LaserJet Pro 500 color MFP M570 printer software in Windows on a Wireless Network & Wired Network.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Windows Tutorial 9 Maintaining Hardware and Software
Securing Windows 7 Lesson 10.
Planning a Group Policy Management and Implementation Strategy
Presentation transcript:

Configuring Windows Vista Security Lesson 8

Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental controls Set up users and system access 2.3 Setting Up Parental Controls Troubleshoot Web browsing issues Troubleshoot gaming issues 2.3

Skills Matrix Technology SkillObjective DomainObjective # Introducing Windows Defender Configure Windows Defender Configure custom scans 3.2 Configuring Windows Defender Configure Windows Defender 3.2 Using Software ExplorerManage applications by using Software Explorer 3.2

Skills Matrix Technology SkillObjective DomainObjective # Updating DefinitionsTroubleshoot definition update issues 3.2 Configuring Windows Firewall Settings Configure security settings in Windows Firewall 3.4 Configuring Exceptions and Ports Configure rules and exceptions 3.4

Chapter 8 Accessing Security Center Links Firewall Automatic Updating Malware Protection Other Security Settings

Chapter 8 Monitoring Windows Firewall Whether the Windows Firewall service is currently turned on or off Whether inbound and outbound connections are blocked Whether users are notified when a program is blocked Whether the computer is connected to a domain, private, or public network

Chapter 8 Configuring Windows Firewall Settings IP address Protocol numbers Port number

Chapter 8 Creating a Firewall Exception Click Start, and then click Control Panel. Click Allow A Program Through Windows Firewall. Click Add Program.

Chapter 8 Creating a Firewall Exception (cont.) Select the program for which you want to create an exception, or click Browse to locate the program. Click Change Scope to limit the exception to a specific network or specific addresses. Click OK. Click OK to close the Windows Firewall Settings dialog box.

Chapter 8 Creating a Windows Firewall with Advanced Security Console Click Start, type mmc in the Start Search box, and press Enter. Click File > Add/Remove Snap-In. Scroll down in the Available Snap-ins list, select Windows Firewall With Advanced Security, and click Add.

Chapter 8 Creating a Windows Firewall with Advanced Security Console (cont.) Click Finish to accept the default Local Computer option. Click OK.

Chapter 8 Configuring Automatic Updates Click Start, and then click Control Panel. Click System And Maintenance > Windows Update. Click Change Settings.

Chapter 8 Configuring Automatic Updates (cont.) To enable Automatic Updates, select the Install Updates Automatically radio button. In the Install New Updates spin boxes, specify the frequency and time of day that you want the system to check for updates, and then click OK. Close the Windows Update window.

Chapter 8 Configuring Windows Defender Click Start, and then click Control Panel. Click Security > Windows Defender. Click Tools.

Chapter 8 Configuring Windows Defender (cont.) Click Options. Modify the configuration settings for any of the items listed and click Save. Close the Windows Defender window.

Chapter 8 Using Software Explorer Click Start, and then click Control Panel. Click Security > Windows Defender > Tools > Software Explorer.

Chapter 8 Using Software Explorer (cont.) In the Category dropdown list, select one of the four categories. Select an application in the left pane to display details about it in the right pane. If you select an application that appears suspicious, you can remove or disable it by using the buttons provided. Close the Software Explorer window.

Chapter 8 Encrypting a Folder Click Start, and then click All Programs > Accessories > Windows Explorer. Right-click a file or folder and, from the context menu, select Properties. On the General tab, click Advanced. Select the Encrypt Contents To Secure Data checkbox and click OK.

Chapter 8 Encrypting a Folder (cont.) Click OK to close the Properties sheet. If you selected a folder that contains files or subfolders, a Confirm Attribute Changes dialog box appears, asking you to choose whether to apply changes to the folder only or to the folder and all of its subfolders and files. Select a confirmation option and click OK.

Chapter 8 Viewing the Encryption Attribute Click Start, and then click All Programs > Accessories > Windows Explorer. Right-click a file or folder and, from the context menu, select Properties. On the General tab, click Advanced. The Advanced Attributes dialog box appears. If the Encrypt Contents To Secure Data checkbox is selected, the file or folder is encrypted.

Chapter 8 Setting Up Parental Controls Click Start, and then click Control Panel. Click User Accounts And Family Safety > Parental Controls. Select the account for which you want to configure parental controls.

Chapter 8 Setting Up Parental Controls (cont.) Click the On radio button to enforce the current setting. To restrict Internet access, under Windows Settings, click Windows Vista Web Filter. To impose computer time limits, under Windows Settings, click Time Limits. To control access to games, under Windows Settings, click Games.

Chapter 8 Setting Up Parental Controls (cont.) To control access to applications, under Windows Settings, click Allow And Block Specific Programs. Click OK after configuring each page, and then click OK again to close the User Controls page. Repeat the entire procedure for any other user accounts that you want to control.

Chapter 8 You Learned Malware is malicious software created specifically for the purpose of infiltrating or damaging a computer system without the user’s knowledge or consent. This type of software includes a variety of technologies including viruses, Trojan horses, worms, spyware, and adware.

Chapter 8 You Learned (cont.) Security Center is a centralized console that enables users and administrators to access, monitor, and configure the various Windows Vista security mechanisms. Windows Firewall is a software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others.

Chapter 8 You Learned (cont.) You configure Windows Firewall by creating rules that specify what types of traffic to block and/or allow. Automatic Updates makes it possible to automate the operating system update process by scheduling the downloading and installation of updates to occur at regular intervals, with no user intervention.

Chapter 8 You Learned (cont.) Windows Defender helps to defend against spyware by scanning the places where it most commonly infiltrates a computer. Software Explorer is an application that enables you to monitor details about specific applications running on a Windows Vista computer.

Chapter 8 You Learned (cont.) The Malicious Software Removal Tool is a single-user virus scanner that Microsoft supplies in each of its monthly operating system updates. The Encrypting File System (EFS) is a feature of NTFS that encodes the files on a computer so that even if an intruder can obtain a file, he or she will be unable to read it.

Chapter 8 You Learned (cont.) Windows Vista, in its Home Basic, Home Premium, and Ultimate editions, includes parental controls that you can use to exercise restrictions over other users’ computing habits.