Download presentation
Presentation is loading. Please wait.
Published byCassandra Burns Modified over 6 years ago
1
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer
2
Chapter 8 Objectives Configuring Application Compatibility So Older Applications Work in Windows 7. Configure Application Restrictions to Limit What Software Can Run in Windows 7. Configure Internet Explorer for Secure Browsing Under Various Situations in Windows 7.
3
Configuring Application Compatibility
Applications Developed for Windows 2000 or Windows XP May Not Run Properly in Windows 7. Generally Applications Written for Windows Vista Work in Windows 7. Applications May Stop Responding, Refuse to Start, or Not Run Properly. Application Compatibility Mode Emulates Environment on Older Windows Versions.
4
Application Compatibility Mode
Compatibility Tab of an Application’s Properties Dialog Box: Review four-step process for application compatibility and the various options listed in the textbook in Table 8-2.
5
Application Compatibility Toolkit
Downloadable Resource to Test Compatibility of Older Applications. Useful in Configuring Compatibility. SQL Server Database Retains Information on Compatibility Data. ACT is beyond the scope of the Certification Exam.
6
Internet Explorer Compatibility Issues
Application Compatibility Toolkit Includes Internet Explorer Compatibility Test Tool. Tests Websites and Web-Based Applications in Internet Explorer Versions 7 and 8. Reports Potential Issues with Websites. Should Test with Version of Internet Explorer with Which Users Will View Websites.
7
Configuring Application Restrictions
Application Restrictions Enable You to Limit Types of Software That Run on Computers to Which the Policy Applies. Can Be Set in Local Security Policy or Group Policy in a Domain. Software Restriction Policies Can be Used to Limit Application Installation. Application Control Policies Can Create Separate Rules for Windows Installer Files, Executables, and Script Files.
8
Benefits of Application Restriction
Control Which Programs Can Run on Computers on Your Network. Control Which Programs Users on Multiuser Computers Can Run. Control Whether Software Restriction Policies Apply to All Users. Prevent Attachments from Executing.
9
Setting Software Restriction Policies
Security Levels Are Disallowed, Basic User, and Unrestricted: Local Security and Group Policy both enable you to set software restriction policies and application control policies. You can now configure four types of new rules in the Additional Rules folder.
10
Application Control Policies
AppLocker Allows You to Specify Exactly What Users Are Permitted to Run. AppLocker Defines Rules According to File Attributes; So, For Example, an Old Version of an Application Might Be Forbidden. Prevents Execution of Unlicensed or Unapproved Applications. Prevents Users from Running Applications That Needlessly Consume Bandwidth. Enables Users to Run Approved Applications and Software Updates While Maintaining Requirement That Only Administrative Users May Install Them. Specifies Rules That Apply to a User or Group. Ensures Computers in Compliance with Licensing and Corporate Requirements. Configuration of Applocker demonstrated in textbook. Additional features are mentioned. Can set specific rules on applications. Table 8-3 Compares AppLocker to Software Restriction Policies.
11
Configuring Internet Explorer
Compatibility View Enables Websites Designed for Older Versions to Display Properly in Internet Explorer 8: Internet Explorer can be configured to add or remove websites displayed in Compatibility View. Group Policy can be used to configure Compatibility View in a Domain.
12
Configuring Internet Explorer
You Can Establish Security Settings Separately to Each Type of Website: Security Settings are configured from the Internet Properties Dialog Box. The default zone is the Internet zone. Sites can be moved to other zones. Custom levels can be established.
13
Configuring Internet Explorer
Individual Security Settings Apply to an Internet Zone:
14
Configuring Protected Mode
Internet Explorer Protected Mode Provides Enhanced Levels of Security. Provides Protection from Malware. Prevents Websites from Modifying User or System Files or Downloading Unwanted Software. Prevents Internet Explorer from Writing Data to Any Location Except Temporary Internet Files Folder. Enabled by Default on All Internet Zones Except Trusted Sites. .
15
Configuring Internet Explorer
SmartScreen Filter Turns Automatic Phishing Filter On or Off: Accessed from Safety menu.
16
Configuring Internet Explorer
Privacy Tab for Configuring Cookie Settings and Pop-Up Blocker: Define cookies, and explain handling, and the levels provided on the Privacy tab. Pop-up Blocker Settings can allow pop-ups from certain websites.
17
Configuring Internet Explorer
Content Tab Settings: Parental Controls. Content Advisor Controls Content Users Can View. Certificates Controls Behavior of Certificates Used for Encrypted Connections. Auto-Complete Stores Information and Tries to Complete Web Entries. Feeds and Web Slices Help Configure RSS Feeds.
18
Configuring Internet Explorer
Configuring Providers: Default Search Provider is Bing. You can specify a different search provider or remove search providers from the Manage Add-ons dialog box.
19
Configuring Internet Explorer
Add-Ons Are Optional Additional Features Providing Internet Explorer Additional Functionality. Sometimes Installed Without Your Knowledge. Can Be Viewed and Managed from the Manage Add-Ons Dialog. Options: All Add-Ons Lists All That Have Been Downloaded. Currently Loaded Add-Ons Displays Only Those Used by a Currently or Recently Viewed Web Page. Run Without Permissions Displays Pre-Approved Add-Ons. Downloaded Controls Displays 32-Bit ActiveX Controls Only.
20
Configuring Internet Explorer
InPrivate Browsing: InPrivate Browsing opens new browser window isolated from items such as browser history and temporary Internet files. All tabs within the browser window are protected. Selected from Safety menu. Cookies, browsing history, information supplied on forms, and AutoComplete information are discarded when the session is over. InPrivate Filtering blocks third parties from receiving information on browsing activities.
21
Configuring Internet Explorer
Certificates Dialog Box Displays Available Certificates: Certificates provide secure identification and verification, and protect user information sent across the Internet. These are considered secure websites.
22
Chapter 8: Summary Older Applications May Not Always Work in Windows 7. Application Compatibility Toolkit Can Test for Compatibility. Application Compatibility Mode Emulates Environment on Older Windows Versions. Application Restrictions Enable You to Limit Types of Software That Run on Computers to Which the Policy Applies. Internet Explorer Configurations Include Compatibility View, Settings for Zones, Protected Mode, and InPrivate Browsing, Next Lesson: Chapter 9, “Configuring TCP/IP”
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.