CYBERSECURITY-Week - 4
CYBERSECURITY-Week - 4
Chapter -04
WINDOWS SECURITY
Windows security is your home to manage the tools that protects your device and your data.
Virus and threat protection monitor threats to your device run scans and gets updates to help detect the
latest threats.
Components of windows security:
System security
Encryption and data protection
Windows security baselines
Virtual private network guide
Windows defender firewall
Virus and threat protection
Windows security is built into windows and includes an antivirus program called Microsoft
Defender Antivirus.
If you have another antivirus application installed and turned on, Microsoft defender antivirus
will turn off automatically.
If you uninstall the other app Microsoft defender antivirus will turn on automatically.
If you are having problems receiving windows security updates see, fix windows update errors.
To change your user account to an admin account.
Understand and customize Windows Security Features
Windows security is your home to manage the tools that protects your device and your data.
Virus and threat protection: Monitors threats to your device run scans and gets updates to help detect
the latest threats.
Account protection: Access sign in option and account settings including windows allow and dynamic
lock.
Firewall and network protection: Manage firewall setting and monitor what’s happening with your
network and internet connection.
App and browser control: Update settings for Microsoft defender smart screen to help protect your
device against potentially dangerous apps, files, sites and downloads.
You will have exploit protection and you can customize protection settings for your devices.
Device security: Review built in security options to help protect your device from attack by
Malicious software.
Device performance and help: View status information about your devices performance health and
keep your devices clean and up to date with the latest version of windows.
Family option: Keep tracks of your Kid online activity and the device in your household.
Customize how your device is protected with these Windows security features select start > settings
> update and security > windows security.
Green means there are not any recommended action right now.
Yellow means there is a safety recommendation for you.
Red is a warning that something needs your immediate attention.
Windows security infrastructure:
The windows infrastructure is set of capabilities available to enable Microsoft windows
technologies. In many cases the capabilities meet business needs regardless of the client platform or
technology they are not necessarily limited to Microsoft service options availability to include the
following:
Active directory.
Azura active directory for cloud-based identity service.
Authentication integration via UWNETID and the group service.
Windows domain via trust.
Azura AD authentication.
Name resolution service (DNS).
Microsoft license activation.
Windows workgroups and accounts:
Step 4: Under the computer name or domain change popup you will have the option to join the
workgroup of your choice.
Step5: Ensure that the devices that you want in a particular workgroup are join to that workgroup in the
case the workgroup is name my work group
Local user management deals with managing users with group account that has stored locally
on windows
Local user accounts are specific to a computer
local user & groups is a part of the collection of tools that an administrator can use to manage
single computer as well
Administrator can set permissions and write on a local user accounts or group accounts
On the computer there by controlling access to files & folders
Local user Accounts
The user folder in the local user and group MMC snap-in display all the default user accounts
and the one's creating the administrator privileges the default accounts in the local user and group Utility
or the administrator tor account and the guest account.
The administrator account has the full control of the computer and can assign users rights &
access permission to user has needed it is only used for tasks that require administrative Credentials and
security.
The account is disabled by default the quest account is used by ppl who do not have any on that
computer. the administrator & quest accounts for disable by default.
Local groups
The group folders in the local user and groups MMC snap-in display on the local default groups
and the once created by administrator users with administrative privileges local groups can holds
administrator account, local user account Domain user. admin, guest account, Remote desktop user
accounts, computer account.
Management of local users and groups
Users & groups create in a create active directory around internet website local user account
and group operator on a single window client & cannot be moved b/w the computers
A local group can have many members and a I user accounts can be a member of many groups
Opening local user
The following are some ways to open local users and group managers
Method 1: To run command
Go to start run type LUSRmgr.msc and hit enter
Method 2: Through the computer manager
Go to start type computer manager and hit enter. In the left pane of the computer management
window click local user and groups.
Windows as a service
End of support
There will be no new security updates non security updates free or paid assisted support options
or online technical content updates. Microsoft will continue to support at least one windows10 release
until 14 October 2025.
If you continue to use on unsupported version of windows your pc will still work but it will
become more vulnerable to security risk and viruses. your pc will continue to start and run but you will
no longer receive software updates including security updates from Microsoft.
Servicing channels:
There are three servicing channels in the windows
Process overview of Windows Auto Pilot When initially deploying new windows devices, Windows
Autopilot use the DEM ( Original Equipment Manufacturer optimized versions of windows client the
version is pre-installed on the device so you don’t have to maintain custom images and private for every
device model instead of reimaging the devices your exciting windows installation can be transformed
into a business ready state that can
Privileges
A privilege is the right of an account such as user or group account to perform various system
related operations on the local computer such as shutting down the slm loading the device drives or
changing the system time privileges differ from access rights into two ways.
privileges Control access to system resource and system related tasks whereas access rights
control access to securable objects.
A system administrator assigns privileges to user and group accounts whereas the system grants
or denies access to a securable object based on the access right granted in the ACE is in the
objects DACL.
NTFS permissions
New Technology File System
NT file system NIES) is a process that the windows NT operating system uses for storing,
organizing, and finding files on la Hard disk effectively.
NTFS was first introduced in 1993.
Other similar file system like file allocation table (FAT) & high-performance file system
(HPFS).
File permissions of NTFS
NTFS permissions provide access control for files and folders containers and objects on shared
systems. Typically, Network attached Storage (NAS) there are five basic NIES permissions.
Read: Allows the users or groups to read the file and view its attributes ownership and
permission set.
Write: Allows the user or group to overwrite the file change its attributes view its ownership
and view the permission site.
Read & Execute: Allows the users or group to run and execute the application and perform all
options allowed by the read permission.
Modify: Allows the user or group to modify and delete a file and perform all of the actions
permitted by the Read and Write, Read & Execute permission.
Full control: Allows the user or group to change the permission sit on a file ownership on the
file & perform actions permitted by all other permissions.
To provide or modify control access to the files and Holder that are stored in NTFS file system follow
these steps
Step 3: In the console you can right click on group policy object and click newly create a new policy
object. You can then grant the required rights to set a user’s or groups through these group policy
Objects.
Using Security tab in ADUC (Active Directory Users & Computers)
Step 1: Go to start & click on administrative tools.
Step 2: Click on active directory user & computers.