M06 Protecting Application
M06 Protecting Application
Administrator:
Administrator accounts are special accounts that are used for making changes to
system settings or managing other people's accounts.
They have full Control and access to every setting on the computer.
Every computer will have at least one Administrator account, and if you're the
owner you should already have a password to this account.
If you have administrator credentials,
You can change the properties of any user account.
You can also change the account type from Administrator to Standard User (provided
that at least one Administrator account remains on the computer) or vice versa.
You create computer accounts and designate permission levels from the Family &
Other Users pane of the Accounts category page of the Settings window.
Standard:
It have limited or restricted access privilege
Standard accounts are the basic accounts you use for normal everyday tasks. As a
Standard user, you can do just about anything you would need to do, such as
running software or personalizing your desktop.
An administrator can give other people access to the computer in one of three ways:
Create a user account that is linked to an existing Microsoft account.
Create a user account that is linked to an email address, and register that account as a
Microsoft account.
Create a local account that isnt linked to a Microsoft account.
Every user account has an associated user account name and can have a user account
picture and a password. Any user can change the following details for his or her account:
Account name You can change the display name that appears on the Welcome screen and
Start menu.
Account picture You can change the picture that identifies you on the Welcome screen and
Start menu.
Password You can create or change the password.
All types of user accounts are visible in the Family & Other Users pane. However, the processes
for managing family accounts and non-family accounts differ, so we cover them separately in the
following sections to avoid confusion.
Manage user accounts in the Computer Management console
Some user account management tasks can be completed from the Family & Other Users settings
pane, but others must be performed in the Users node of the Computer Management console.
Security policy settings are rules that administrators configure on a computer or multiple devices
for protecting resources on a device or network. The Security Settings extension of the Local
Group Policy Editor snap-in allows you to define security configurations as part of a Group Policy
Object (GPO).
The GPOs are linked to Active Directory containers such as sites, domains, or organizational units,
and they enable you to manage security settings for multiple devices from any device joined to
the domain.
Security settings policies are used as part of your overall security implementation to help secure
domain controllers, servers, clients, and other resources in your organization.
To manage security configurations for multiple devices, you can use one of the following options:
For more info about managing security configurations, see Administer security policy settings.
Account Policies. These policies are defined on devices; they affect how user accounts can
interact with the computer or domain. Account policies include the following types of
policies:
o Password Policy. These policies determine settings for passwords, such as enforcement
and lifetimes. Password policies are used for domain accounts.
o Account Lockout Policy. These policies determine the conditions and length of time
that an account will be locked out of the system. Account lockout policies are used for
domain or local user accounts.
o Kerberos Policy. These policies are used for domain user accounts; they determine
Kerberos-related settings, such as ticket lifetimes and enforcement.
Local Policies. These policies apply to a computer and include the following types of
policy settings:
For devices running Windows 7 and later, we recommend to use the settings under
Advanced Audit Policy Configuration rather than the Audit Policy settings under Local
Policies.
o User Rights Assignment. Specify the users or groups that have sign-in rights or
privileges on a device
o Security Options. Specify security settings for the computer, such as Administrator
and Guest Account names; access to floppy disk drives and CD-ROM drives;
Software Restriction Policies. Specify settings to identify software and to control its ability
to run on your local device, organizational unit, domain, or site.
Application Control Policies. Specify settings to control which users or groups can run
particular applications in your organization based on unique identities of files.
Advanced Audit Policy Configuration. Specify settings that control the logging of security
events into the security log on the device. The settings under Advanced Audit Policy
Configuration provide finer control over which activities to monitor as opposed to the Audit
Policy settings under Local Policies.
Logon or Startup messages let you display a reminder or any important message, every
time users log into a Windows computer. As a company, some may even choose to display
legal notices on every start-up.
1.5 Manage email and account settings on Windows 10
E- Mail
- E- Mail (electronic mail) is the exchange of computer-stored messages by tele communication.
Email messages are usually encoded in American Standard Code for Information Interchange
(ASCII) text. However, you can also send non text files, such as graphic images and sound files
as attachments sent in binary streams.
There are several types of Microsoft service accounts, each with its own advantages and
disadvantages:
Built-in service account: On a local computer, you can configure an application to run under one
of the three built-in service accounts: LocalService, NetworkService or LocalSystem. These
accounts do not have passwords.
A traditional Microsoft service account is just a standard user account. Ideally, it should
be an account created and used exclusively to run a particular service, but all too often,
business users and admins use their regular user accounts as service accounts in the name
of expediency. Unlike the built-in service accounts, these accounts do have passwords.
Traditional service accounts can be created like any other user account, such as with
Active Directory Users and Computers (ADUC) or your identity management solution.
Managed service account (MSA) or, more precisely, standalone managed service account
(sMSA) :
In Windows Server 2008 R2, Microsoft introduced the managed service account, which
improves security by eliminating the need for an administrator to manually manage the
credentials for each service account. Instead, an sMSA establishes a complex password and
changes that password on a regular basis (by default, every 30 days).
An sMSA cannot be shared between multiple computers (hence the modifier standalone).
Self-check 1
Instruction I: Write True if the statement is correct and False if the statement is incorrect
1. A user account allows you to sign in to your computer
2. to share your computer with others, you can create a separate user account for each person
3. Standard user account can change the properties of any user account
4. It's safer to be signed in to a Standard account than an Administrator account
5. User Rights Assignment, Specify the users or groups that have sign-in rights or privileges
on a device
6. Kerberos Policy are used for domain user accounts
7. Password Policy determine settings for passwords
Operation Sheet 1
3. Select I don't have this person's sign-in information, and on the next page, select Add a
user without a Microsoft account.
Operation Sheet 2
Step 2: Next, when in the Registry Editor window, navigate to the following key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\System
Step 3: Under this key, you will notice two entries. It is these entries that need modification, to
activate a start-up message:
Legalnoticecaption
Legalnoticetext
Step 4: For doing so, right-click on the each of them, one after the other and choose the
Modify option.
is first essential to understand the function of these two values. The first one, i.e.,
the legalnoticecaption value controls the title of the message. The message appears in a
large font on your computer screen.
Harmful program
Malware, or malicious software, is any program or file that is intentionally harmful to a computer,
network or server. Types of malware include computer viruses, worms, Trojan horses,
ransomware and spyware.
Virus work on a computer in the ways of
Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data.
The main purpose of a worm is to self-replicate and propagate across the network. A virus
is a type of malicious software that needs a user to spread.
Virus protection
- Virus protection software is designed to prevent viruses, worms and Trojan horses from
getting onto a computer as well as remove any malicious software code that has already
infected a computer.
- Most virus protection utilities now bundle anti-spyware and anti-malware capabilities to go
along with anti-virus protection.
Anti-virus Selection
We recommend the best products through an independent review process, and advertisers do
not influence our picks. We may receive compensation if you visit partners we recommend.
Read our advertiser disclosure for more info.
Data breaches were up 68% in 2021 compared to the previous year. Personal information
such as Social Security numbers, birth dates, bank account information, and credit card
numbers is at risk. That data is then available on the dark web and can be used to ruin your
financial life. In fact, the personal information of people with a high credit score can sell for
relatively little on the dark net.
The 6 Best Antivirus Software of 2022
Antivirus gives you complete control over how antivirus scans run on targeted devices, and which
options are available to end users. For example, depending on the purpose or scheduled time of
an antivirus scan, you may want to show the Antivirus client on end user devices, allow the end
user to perform antivirus scans, view and restore quarantined objects, download virus definition
file updates on their own, and so on. You can do this by creating and applying antivirus settings to
a scan task.
Whether the Antivirus icon appears in device system trays (providing end user access to
antivirus scanning, quarantine and backup viewing, and file handling tasks)
Real-time email scanning
End user right-click scans
CPU usage
Owner (to restrict access)
Scheduled antivirus scans
Quarantine/backup folder size
Restoring infected and suspicious objects
Specifying which files, folders, and file types to scan
Scan exclusions
Whether to use heuristic analysis for detecting suspicious files
Whether to scan for riskware
Real-time file protection (including which files to scan, heuristics, and exclusions)
Downloading virus definition file updates (pilot test versions, scheduled downloads, end
user download permission, and direct downloads from the security content serve
For more information about how to remove a computer virus and spyware, see the following
article in the Microsoft Knowledge Base: 2671662 - Microsoft resources and guidance for removal
of malware and viruses
1. Install the latest updates from Microsoft Update
2. Use the free Microsoft Safety Scanner
3. Use the Windows Malicious Software Removal Tool
4. Manually remove the rogue security software
5. Run Microsoft Defender Offline
Spam definition
Spam is not an acronym for a computer threat, although some have been proposed (stupid
pointless annoying malware, for instance). The inspiration for using the term spam to describe
mass unwanted messages is a Monty Python skit in which the actors declare that everyone must
eat the food Spam, whether they want it or not. Similarly, everyone with an email address must
unfortunately be bothered by spam messages, whether we like it or not.
Types of spam
Phishing emails
Phishing emails are a type of spam cybercriminals sends to many people, hoping to hook a few
people. Phishing emails trick victims into giving up sensitive information like website logins or
credit card information.
Email spoofing
Spoofed emails spoof, an email from a legitimate sender, and ask you to take some sort of
action. Well-executed spoofs will contain familiar branding and content, often from a large well-
known company such as PayPal or Apple. Common email spoofing spam messages include:
In a tech support spam, the spam message indicates that you have a technical problem and you
should contact tech support by calling the phone number or clicking a link in the message. Like
email spoofing, these types of spam often say they are from a large technology company like
Microsoft or a cybersecurity company like Malwarebytes.
Advance-fee spams
This type of spam is likely familiar to anyone who has been using email since the 90s or 2000s.
Sometimes called Nigerian prince emails as that was the purported message sender for many
years, this type of spam promises a financial reward if you first provide a cash advance. The
sender typically indicates that this cash advance is some sort of processing fee or earnest money
to unlock the larger sum, but once you pay, they disappear. To make it more personal, a similar
type of scam involves the sender pretending to be a family member that is in trouble and needs
money, but if you pay, unfortunately the outcome is the same.
Malspam
Short for malware spam or malicious spam, malspam is a spam message that delivers
malware to your device. A common delivery method is to include malicious scripts in an
attachment of a familiar type like a Word document, PDF file, or PowerPoint presentation. Once
the attachment is opened, the scripts run and retrieve the malware payload.
Have you ever received a robocall? Thats call spam. A text message from an unknown sender
urging you to click an unknown link? Thats referred to as text message spam or smishing, a
combination of SMS and phishing.
If youre receiving spam calls and texts on your Android or iPhone, most major carriers give you
an option to report spam. Blocking numbers is another way to combat mobile spam.
While it may not be possible to avoid spam altogether, there are steps you can take to help
protect yourself against falling for a spam or getting phished from a spam message:
Learn to spot phishing
All of us can fall victim to phishing attacks. We may be in a rush and click a malicious link without
realizing. If a new type of phishing attack comes out, we may not readily recognize it. To protect
yourself, learn to check for some key signs that a spam message isnt just annoyingits a
phishing attempt:
Report spam
Reporting spam can help your email provider or phone service carrier get better at detecting
spam. If legitimate emails get sent to your spam filter, you can report that they should not be
marked as spam, and that also provides useful information on what should not be filtered.
Another helpful step is to add senders you want to hear from to your contacts list proactively.
With two-factor or multi-factor authentication, even if your username and password are
compromised via a phishing attack, cybercriminals wont be able to get around the
additional authentication requirements tied to your account.
Install cybersecurity
In the event that you click a bad link or download malware sent to you via spam, good cyber
security software will recognize the malware and shut it down before it can do any damage to your
system or network. With products for home and business, Malwarebytes has got you covered
wherever technology takes you.
- Spam Filter detects spam emails based on the reputation score of the senders IP address. The
senders address is the address of the host that connects to the SMTP server to deliver an email
message, not an address within the email header.
- An email is classified as spam if the senders reputation is below the spam threshold, or is
classified as suspected spam if the senders reputation is between the spam threshold and
suspected spam threshold. An email is not classified as spam if the senders reputation is above
the suspected spam threshold.
The spam filter policy: Specifies the actions for spam filtering verdicts and the notification
options.
The spam filter rule: Specifies the priority and recipient filters (who the policy applies to)
for a spam filter policy.
In order for us to help, we will need to use the following process if you receive a spam email:
1. Forward the email to [email protected]
2. DELETE the spam email from EMC
3. Continue with the next contact