Download presentation
Presentation is loading. Please wait.
Published byAlaina Brown Modified over 9 years ago
1
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
2
Agenda Chapter 7: Working with Applications Exercise / Lab Quiz
3
Configuring Internet Explorer 8 Compatibility view ▫Change manually or via Group policy RSS feeds ▫Automatically retrieves new content from the content provider Printing with IE
4
Configuring Internet Explorer 8 Managing add-ons ▫Separate software components ▫The four basic types of add-ons supported by IE are as follows: Toolbars and Extensions Search Providers Accelerators Enable users to send content to other resources, in the form of applications running on the computer or other sites on the Internet InPrivate Filtering Enables you to import and export XML files containing InPrivate filters
5
Securing Internet Explorer Protected Mode ▫Prevent attackers ▫Mandatory Integrity Control (MIC) assigns various integrity access levels to processes running on the computer High (Admin), Medium (User), Low (Untrusted) ▫Only works with IE8 running on Vista or Windows 7, not XP
6
Securing Internet Explorer (Cont.) Security Zones ▫Internet Default Zone for all sites Run in protected mode and have minimal access ▫Local Intranet Do not run in protected mode and have significant access ▫Trusted Sites Most elevated set of privileges and is intended for sites that you can trust not to damage the computer ▫Restricted Sites Most reduced set of privileges and runs in protected mode
7
Securing Internet Explorer SmartScreen Filter ▫Warn if there is phishing activity InPrivate Mode ▫InPrivate Browsing Prevents IE from maintaining a permanent record of the user’s activities during browsing session ▫InPrivate Filtering Enables you to block content providers from gathering your information
8
Securing Internet Explorer Pop-Up Blocker Privacy Settings ▫Use privacy settings to limit the ability of Web sites to create cookies Browsing with Certificates ▫Secure Sockets Layer (SSL) with digital certificate
9
Troubleshooting Program Compatibility Program Compatibility Troubleshooter ▫a wizard-based solution ▫Tries to determine why an application is not running properly and gives you two options Try Recommended Settings Automatically configure and run the software with compatibility settings Troubleshoot Program A help wizard that lead you through series of questions
10
Setting Compatibility Modes Can set compatibility modes manually through the executable’s Properties sheet
11
Configuring Application Compatibility Policies To suppress the compatibility warnings Limit users’ access to compatibility mode controls ▫Notify blocked drivers ▫Detect application installers that need to be run as administrator ▫Remove Program Compatibility Property Page
12
Using the Application Compatibility Toolkit A collection of programs to help you gather information and create solutions ▫Application Compatibility Manager ▫Compatibility Administrator ▫Internet Explorer Compatibility Test tool ▫Setup Analysis tool ▫Standard User Analyzer
13
Application Compatibility Manager Designed for large-scale Windows 7 deployments Collect ▫To collect information from other computers on the network, you create data collection packages (DCPs) Analyze ▫The analysis of the collected data begins with organization, which can include categorization, prioritization, application assessment, and assignment of deployment status Test and Mitigate ▫Test applications and create mitigation strategies, using the Compatibility Administrator application
14
Compatibility Administrator A main area for solutions to known compatibility problems for hundreds of commercial Windows 7 applications
15
Internet Explorer Compatibility Test Tool Examines the compatibility of the web sites
16
Setup Analysis Tool Logging tool to analyze application setup programs for compatibility issues ▫Installation of 16-bit components ▫Installation of Graphical Identification and Authentication DLLs ▫Changes to files or registry keys that exist under Windows Resource Protection
17
Standard User Analyzer Examines applications for compatibility issues caused by the User Account Control (UAC) feature of Windows 7
18
Using Windows XP Mode Creates a virtual machine running Windows XP on your Windows 7 system Used for applications that will not run any other way Has extensive hardware requirements
19
Configuring Application Restrictions Restricting the applications that users can run on their computers Two mechanisms for restricting application ▫Group Policy settings: software restriction policies ▫AppLocker
20
Using Software Restriction Policies Certificate rules ▫Based on the inclusion of a certificate signed by the software publisher Hash rules ▫Based on a digital fingerprint that remains valid even when the name or location of the executable file changes Network zone rules ▫Identify Windows Installer (.msi) packages downloaded with Internet Explorer based on the security zone of the site from which they are downloaded Path rules ▫Identify applications by specifying a file or folder name or a registry key Default rule ▫Applies when an application does not match any of the other rules
21
Configuring Rule Settings The three possible settings ▫Disallow ▫Basic User ▫Unrestricted Resolving Conflicts ▫The more specific rule takes precedence over the less specific. Hash rules Certificate rules Path rules Zone rules
22
Using AppLocker Application Control Policies New feature in Windows 7 Enterprise and Ultimate Creation of rules is easier than Group Policy ▫Wizard-based Only applies to Windows 7 and Windows Server 2008 R2
23
Understanding Rule Types Rule Types ▫Executable rules Contains rules that apply to files with.exe and.com extensions ▫Windows Installer rules Contains rules that apply to Windows Installer packages with.msi and.msp extensions ▫Script rules Contains rules that apply to script files with.ps1,.bat,.cmd,.vbs, and.js extensions Criteria for resource access: ▫Publisher ▫Path ▫File Hash
24
Assignment Matching Multiple Choice Case Scenario 2
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.