Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

® Microsoft Office 2010 Browser and Basics.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Configuring Windows Internet Explorer 7 Security Lesson 5.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 13: Administering Web Resources.
Lesson 4: Web Browsing.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Lesson 18: Configuring Application Restriction Policies
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
16.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 16: Examining Software Update.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
Microsoft ® Official Course Module 9 Configuring Applications.
PowerPoint Presentation to Accompany GO! with Internet Explorer 9 Getting Started Chapter 3 Exploring the World Wide Web with Internet Explorer 9.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Administering Windows 7 Lesson 11. Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand.
Hands-On Microsoft Windows Server 2008
Configuring and Troubleshooting Internet Access Chapter 9 powered by dj.
Tutorial 11 Installing, Updating, and Configuring Software
Using Windows Firewall and Windows Defender
Configuring Windows Vista Applications Lesson 9. Skills Matrix Technology SkillObjective DomainObjective # Configuring Internet Explorer 7 Configure Windows.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 9 User Productivity Tools.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Week #7 Objectives: Secure Windows 7 Desktop
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Troubleshooting Windows Vista Security Chapter 4.
Chapter 3 (HW02) Exploring the World Wide Web with Internet Explorer 9.
Tutorial 1: Browser Basics.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Database-Driven Web Sites, Second Edition1 Chapter 5 WEB SERVERS.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Module 5: Configuring Internet Explorer and Supporting Applications.
Week #3 Objectives Partition Disks in Windows® 7 Manage Disk Volumes Maintain Disks in Windows 7 Install and Configure Device Drivers.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
XP Browser and Basics COM111 Introduction to Computer Applications.
11 MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY Chapter 12.
NetTech Solutions Protecting the Computer Lesson 10.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 9 User Productivity Tools.
Understand Internet Security LESSON Security Fundamentals.
Lesson 6: Controlling Access to Local Hardware and Applications
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Windows Tutorial 5 Protecting Your Computer
Lesson 4: Web Browsing.
MOAC : Configuring Windows 8.1
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 13: Administering Web Resources.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Lesson 4: Web Browsing.
Designing IIS Security (IIS – Internet Information Service)
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Working with Applications Lesson 7

Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application Restrictions

ADMINISTERING INTERNET EXPLORER

Configuring Internet Explorer Compatibility view Managing add-ons Search options Accelerators RSS feeds Printing with IE

Compatibility View

Add-Ons Add-ons are separate software components that interact with the basic functions of the web browser Provide an interface between –the browser and another software product –the browser and a specific site on the Internet

Add-Ons Toolbars and Extensions: –Enable the browser to open and manipulate Web sites or file types that IE does not support natively –Some applications add their own toolbars to IE, enabling you to work with their documents within an IE session

Add-Ons Search Providers - Enable the user to perform searches directly from the IE interface using search engines on the Internet or the local network Accelerators - Enable users to send text or other media they select in an IE browser window to another application InPrivate Filtering - Enables you to import and export XML files containing InPrivate

Managing Add-Ons

Configuring Search Options

Configuring Accelerators

RSS Feeds RSS feeds simplifies the process of delivering updated content from Web sites that provide frequently changing content to designated users The whole point of an RSS feed is to eliminate the need for users to open multiple Web sites and browse for new content You must subscribe to RSS feeds. Subscription is the term used to refer to the process of configuring the RSS client to receive transmissions from a particular site

Configuring RSS Feeds

Printing with IE

Securing Internet Explorer Protected Mode Security Zones SmartScreen Filter InPrivate Mode Pop-Up Blocker Privacy Settings Browsing with Certificates

Understanding Protected Mode Prevents attackers from accessing vital system components Runs IE with highly reduced privileges Can only write data to low integrity disk locations, like the Temporary Internet Files folder, and History, Cookies, and Favorites

Security Zones Internet –All Web sites that are not listed in the other three zones fall into this zone –Sites in the Internet zone run in protected mode and have minimal access to the computer drives and configuration settings

Security Zones Local Intranet –IE automatically detects sites that originate from the local intranet and places them in this zone –Sites in this zone do not run in protected mode and have significant access to the system

Security Zones Trusted Sites –This zone provides the most elevated set of privileges and is intended for sites that you can trust not to damage the computer –By default, there are no sites in this zone; you must add them manually.

Security Zones Restricted Sites –This zone has the most reduced set of privileges and runs in protected mode –It is intended for Web sites that are known to be malicious, but which users still must access for some reason –By default, there are no sites in this zone; you must add them manually

Configuring Security Zones

Configuring the SmartScreen Filter Warns users of potential phishing Web sites Online lookup of phishing sites Online lookup of download sites Onsite analysis

Using InPrivate Mode Enables you to surf the Internet without leaving any record of your activities InPrivate Browsing - enables you to surf the Internet without leaving any record of your activities. InPrivate Filtering - Prevents third-party Web sites from compiling information about an IE users browsing practices.

Using InPrivate Mode

Configuring Pop-Up Blocker

Configuring Privacy Settings Cookie – A file containing information about you or your web-surfing habits Use privacy settings to limit the ability of Web sites to create cookies

SSL Secure Socket Layer the protocol that most Web sites use when establishing secure connections with clients over the Internet SSL communication is based on the exchange of digital certificates A digital certificate is a credential, issued by a trusted parry that confirms the identity of the web server and enables the client and the server to exchange encrypted traffic

Browsing with Certificates

CONFIGURING APPLICATION COMPATIBILITY

Troubleshooting Program Compatibility Program Compatibility Troubleshooter Tries to determine why an application is not running properly and gives you two options

Setting Compatibility Modes Can set compatibility modes manually through the executable’s Properties sheet

Configuring Application Compatibility Policies

Using the Application Compatibility Toolkit The Application Com2tatibiliry Toolkit (ACT) 5.5 is available as a free download from the Microsoft Download Center Application Compatibility Manager Compatibility Administrator Internet Explorer Compatibility Test tool Setup Analysis tool Standard User Analyzer

Application Compatibility Manager

Compatibility Administrator

Internet Explorer Compatibility Test Tool

Setup Analysis Tool Logging tool to analyze application setup programs for compatibility issues: –Installation of kernel mode drivers –Installation of 16-bit components –Installation of Graphical Identification and Authentication DLLs –Changes to files or registry keys that exist under Windows Resource Protection

Standard User Analyzer

Using Windows XP Mode Creates a virtual machine running Windows XP on your Windows 7 system Used for applications that will not run any other way Free download from Microsoft Has extensive hardware requirements

CONFIGURING APPLICATION RESTRICTIONS

Using Software Restriction Policies Rules that specify which applications users can run

Creating Rules Certificate rules Hash rules Network zone rules Path rules Default rule

Configuring Rule Settings The three possible settings: 1.Disallow 2.Basic User 3.Unrestricted Most restrictive and secure way is to Disallow all applications and then create Unrestricted rules for the applications you want users to run

Using AppLocker New feature in Windows 7 Enterprise and Ultimate to create application restrictions more easily Application Control Policies Creation of rules is easier - Wizard-based Only applies to Windows 7 and Windows Server 2008 R2

Understanding Rule Types Executable rules - Contains rules that apply to files with.exe and.com extensions Windows Installer rules - Contains rules that apply to Windows Installer packages with.msi and.msp extensions. Script rules - Contains rules that apply to script files with.ps1,.bat,.cmd,.vbs, and.js extensions.

Understanding Rule Types Criteria for resource access: Publisher - Identifies code-signed applications by means of a digital signature extracted from an application file Path - Identifies applications by specif ing a file or folder name File Hash - Identifies applications based on a digital fingerprint that remains valid even when the name or location of the executabie file changes

Creating Default Rules

Creating Rules Automatically

Creating Rules Manually Wizard prompts you for the following information: –Action –User or group –Conditions –Exceptions

Skills Summary Compatibility View, in IE8, enables the browser to display older pages properly. Add-ons are separate software components that interact with the basic functions of the web browser. Accelerators enable users to send content to other resources in the form of applications running on the computer or other sites on the Internet. Protected mode is a way to run Internet Explorer 8 with highly reduced privileges.

Skills Summary (cont.) A SmartScreen Filter examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. Security zones have different sets of privileges to provide levels of access. A gold lock appears in the address bar of IE when a user connects to a secure site (SSL). In Windows 7, administrators must take measures to ensure the compatibility of their legacy applications.

Skills Summary (cont.) Application Compatibility Toolkit is for application incompatibilities that are not readily solvable with the Windows 7 compatibility mode settings. Software restriction policies enable administrators to specify the programs that are allowed to run on workstations. AppLocker enables administrators to create application restriction rules more easily.