SlideShare a Scribd company logo
Working with Applications Lesson 7
Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application Restrictions
ADMINISTERING  INTERNET EXPLORER
Configuring Internet Explorer Compatibility view Managing add-ons Search options Accelerators RSS feeds Printing with IE
Compatibility View
Managing Add-Ons
Configuring Search Options
Configuring Accelerators
Configuring RSS Feeds
Printing with IE
Securing Internet Explorer Protected Mode Security Zones SmartScreen Filter InPrivate Mode Pop-Up Blocker Privacy Settings Browsing with Certificates
Understanding Protected Mode Prevents attackers from accessing vital system components Runs IE with highly reduced privileges Can only write data to low integrity disk locations, like the  Temporary Internet Files  folder, and  History ,  Cookies,  and  Favorites
Configuring Security Zones Internet Local intranet Trusted sites Restricted sites
Configuring the SmartScreen Filter Warns users of potential phishing Web sites Online lookup of phishing sites Online lookup of download sites Onsite analysis
Using InPrivate Mode Enables you to surf the Internet without leaving any record of your activities InPrivate Browsing InPrivate Filtering
Configuring Pop-Up Blocker
Configuring Privacy Settings Cookie  – A file containing information about you or your web-surfing habits Use privacy settings to limit the ability of Web sites to create cookies
Browsing with Certificates
CONFIGURING APPLICATION COMPATIBILITY
Troubleshooting Program Compatibility Program Compatibility Troubleshooter Tries to determine why an application is not running properly and gives you two options
Setting Compatibility Modes Can set compatibility modes manually through the executable’s Properties sheet
Configuring Application Compatibility Policies
Using the Application Compatibility Toolkit Application Compatibility Manager Compatibility Administrator Internet Explorer Compatibility Test tool Setup Analysis tool Standard User Analyzer
Application Compatibility Manager
Compatibility Administrator
Internet Explorer Compatibility Test Tool
Setup Analysis Tool Logging tool to analyze application setup programs for compatibility issues: Installation of kernel mode drivers Installation of 16-bit components Installation of Graphical Identification and Authentication DLLs Changes to files or registry keys that exist under Windows Resource Protection
Standard User Analyzer
Using Windows XP Mode Creates a virtual machine running Windows XP on your Windows 7 system Used for applications that will not run any other way Free download from Microsoft Has extensive hardware requirements
CONFIGURING APPLICATION RESTRICTIONS
Using Software Restriction Policies Rules that specify which applications users can run
Creating Rules Certificate rules Hash rules Network zone rules Path rules Default rule
Configuring Rule Settings The three possible settings: Disallow Basic User Unrestricted Most restrictive and secure way is to  Disallow  all applications and then create  Unrestricted  rules for the applications you want users to run
Using AppLocker New feature in Windows 7 Enterprise and Ultimate to create application restrictions more easily Application Control Policies Creation of rules is easier - Wizard-based Only applies to Windows 7 and Windows Server 2008 R2
Understanding Rule Types Executable rules Windows Installer rules Script rules Criteria for resource access: Publisher Path File Hash
Creating Default Rules
Creating Rules Automatically
Creating Rules Manually Wizard prompts you for the following information: Action User or group Conditions Exceptions
Skills Summary Compatibility View, in IE8, enables the browser to display older pages properly. Add-ons are separate software components that interact with the basic functions of the web browser. Accelerators enable users to send content to other resources in the form of applications running on the computer or other sites on the Internet.  Protected mode is a way to run Internet Explorer 8 with highly reduced privileges.
Skills Summary (cont.) A SmartScreen Filter examines traffic for evidence of phishing activity and displays a warning to the user if it finds any. Security zones have different sets of privileges to provide levels of access. A gold lock appears in the address bar of IE when a user connects to a secure site (SSL). In Windows 7, administrators must take measures to ensure the compatibility of their legacy applications.
Skills Summary (cont.) Application Compatibility Toolkit is for application incompatibilities that are not readily solvable with the Windows 7 compatibility mode settings. Software restriction policies enable administrators to specify the programs that are allowed to run on workstations. AppLocker enables administrators to create application restriction rules more easily.
Ad

More Related Content

What's hot (20)

Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmt
odanyboy
 
Overview of RateSetter web security
Overview of RateSetter web security Overview of RateSetter web security
Overview of RateSetter web security
RateSetter
 
Parameter tampering
Parameter tamperingParameter tampering
Parameter tampering
Dilan Warnakulasooriya
 
Secure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scriptingSecure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scripting
Secure Code Warrior
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
Per Larsen
 
JPA1404 Context-based Access Control Systems for Mobile Devices
JPA1404  Context-based Access Control Systems for Mobile DevicesJPA1404  Context-based Access Control Systems for Mobile Devices
JPA1404 Context-based Access Control Systems for Mobile Devices
chennaijp
 
Secure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusion
Secure Code Warrior
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0
Ayed Al Qartah
 
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Veracode
 
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Lenur Dzhemiliev
 
Injection flaws
Injection flawsInjection flaws
Injection flaws
DANISH INAMDAR
 
Broken access controls
Broken access controlsBroken access controls
Broken access controls
Akansha Kesharwani
 
Introduction to security testing raj
Introduction to security testing rajIntroduction to security testing raj
Introduction to security testing raj
Rajakrishnan S, MCA,MBA,MA Phil,PMP,CSM,ISTQB-Test Mgr,ITIL
 
Collecting Symantec Code Signing Certificate - CodeSigningStore
Collecting Symantec Code Signing Certificate - CodeSigningStoreCollecting Symantec Code Signing Certificate - CodeSigningStore
Collecting Symantec Code Signing Certificate - CodeSigningStore
CodeSigningStore
 
presentation_finals
presentation_finalspresentation_finals
presentation_finals
Shivashish Kumar
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
Rashid Khatmey
 
Justcloud
JustcloudJustcloud
Justcloud
Megha Sahu
 
2 . web app s canners
2 . web app s canners2 . web app s canners
2 . web app s canners
Rashid Khatmey
 
Secure Code Warrior - Authentication
Secure Code Warrior - AuthenticationSecure Code Warrior - Authentication
Secure Code Warrior - Authentication
Secure Code Warrior
 
Handy penetration testing tools
Handy penetration testing toolsHandy penetration testing tools
Handy penetration testing tools
Mindfire LLC
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmt
odanyboy
 
Overview of RateSetter web security
Overview of RateSetter web security Overview of RateSetter web security
Overview of RateSetter web security
RateSetter
 
Secure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scriptingSecure Code Warrior - Cross site scripting
Secure Code Warrior - Cross site scripting
Secure Code Warrior
 
Ewug 1808 take conditional access to the next level
Ewug 1808   take conditional access to the next levelEwug 1808   take conditional access to the next level
Ewug 1808 take conditional access to the next level
Per Larsen
 
JPA1404 Context-based Access Control Systems for Mobile Devices
JPA1404  Context-based Access Control Systems for Mobile DevicesJPA1404  Context-based Access Control Systems for Mobile Devices
JPA1404 Context-based Access Control Systems for Mobile Devices
chennaijp
 
Secure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusionSecure Code Warrior - Remote file inclusion
Secure Code Warrior - Remote file inclusion
Secure Code Warrior
 
Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0Malware Defense-in-Depth 2.0
Malware Defense-in-Depth 2.0
Ayed Al Qartah
 
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Developing Web Applications Securely - How to Fix Common Code Vulnerabilities...
Veracode
 
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Lenur Dzhemiliev
 
Collecting Symantec Code Signing Certificate - CodeSigningStore
Collecting Symantec Code Signing Certificate - CodeSigningStoreCollecting Symantec Code Signing Certificate - CodeSigningStore
Collecting Symantec Code Signing Certificate - CodeSigningStore
CodeSigningStore
 
4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
Rashid Khatmey
 
Secure Code Warrior - Authentication
Secure Code Warrior - AuthenticationSecure Code Warrior - Authentication
Secure Code Warrior - Authentication
Secure Code Warrior
 
Handy penetration testing tools
Handy penetration testing toolsHandy penetration testing tools
Handy penetration testing tools
Mindfire LLC
 

Viewers also liked (20)

IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14
blusmurfydot1
 
La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologico
Euler Ruiz
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humano
Euler Ruiz
 
Stay Out Please
Stay Out PleaseStay Out Please
Stay Out Please
efim13
 
Javascript for Wep Apps
Javascript for Wep AppsJavascript for Wep Apps
Javascript for Wep Apps
Michael Puckett
 
IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11
blusmurfydot1
 
La computadora
La computadoraLa computadora
La computadora
silovera
 
Parking hormigon prefabricado
Parking hormigon prefabricadoParking hormigon prefabricado
Parking hormigon prefabricado
CAMPUS11
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02
blusmurfydot1
 
Test bram
Test bramTest bram
Test bram
bramgeenen
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
blusmurfydot1
 
Zonas erroneas y la salud mental
Zonas erroneas y la salud mentalZonas erroneas y la salud mental
Zonas erroneas y la salud mental
Euler Ruiz
 
IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08
blusmurfydot1
 
El pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEl pensamiento positivo y la mente humana
El pensamiento positivo y la mente humana
Euler Ruiz
 
Aparato circulatorio
Aparato circulatorioAparato circulatorio
Aparato circulatorio
Euler Ruiz
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
kturne10
 
Organizadores
OrganizadoresOrganizadores
Organizadores
bernardo55
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13
blusmurfydot1
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14
blusmurfydot1
 
La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologico
Euler Ruiz
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humano
Euler Ruiz
 
Stay Out Please
Stay Out PleaseStay Out Please
Stay Out Please
efim13
 
IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11
blusmurfydot1
 
La computadora
La computadoraLa computadora
La computadora
silovera
 
Parking hormigon prefabricado
Parking hormigon prefabricadoParking hormigon prefabricado
Parking hormigon prefabricado
CAMPUS11
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
blusmurfydot1
 
Zonas erroneas y la salud mental
Zonas erroneas y la salud mentalZonas erroneas y la salud mental
Zonas erroneas y la salud mental
Euler Ruiz
 
IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08IT103Microsoft Windows XP/OS Chap08
IT103Microsoft Windows XP/OS Chap08
blusmurfydot1
 
El pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEl pensamiento positivo y la mente humana
El pensamiento positivo y la mente humana
Euler Ruiz
 
Aparato circulatorio
Aparato circulatorioAparato circulatorio
Aparato circulatorio
Euler Ruiz
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
kturne10
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13
blusmurfydot1
 
Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06Itt operating systems unit 05 lesson 06
Itt operating systems unit 05 lesson 06
blusmurfydot1
 
Ad

Similar to IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07 (20)

What's New in Windows 7
What's New in Windows 7What's New in Windows 7
What's New in Windows 7
Acend Corporate Learning
 
Windows 7 Enhanced Security And Control
Windows 7 Enhanced Security And ControlWindows 7 Enhanced Security And Control
Windows 7 Enhanced Security And Control
Keith Combs
 
Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)
Microsoft Argentina y Uruguay [Official Space]
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
Rishu Mehra
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
3 App Compat Win7
3 App Compat Win73 App Compat Win7
3 App Compat Win7
llangit
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate Learning
Acend Corporate Learning
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
sdrayin
 
CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies
CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies
CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies
MorganLudwig40
 
Browser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1OutliBrowser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1Outli
VannaSchrader3
 
Chapter 7)
Chapter 7)Chapter 7)
Chapter 7)
webhostingguy
 
CodeIgniter
CodeIgniterCodeIgniter
CodeIgniter
Sandun_Prasanna
 
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 OverviewWindows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Vijay Raj
 
Internet Explorer 8
Internet Explorer 8Internet Explorer 8
Internet Explorer 8
Eduardo Castro
 
WebSec_MSR.ppt
WebSec_MSR.pptWebSec_MSR.ppt
WebSec_MSR.ppt
LucaMartins7
 
Final viva
Final vivaFinal viva
Final viva
Deepwork Inc.
 
Customized Browser Displaying Multiple Sessions in a Carousel View
Customized Browser Displaying Multiple Sessions in a Carousel ViewCustomized Browser Displaying Multiple Sessions in a Carousel View
Customized Browser Displaying Multiple Sessions in a Carousel View
Mike Taylor
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
Presentologics
 
Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang pci v1[1]
Gazzang pci v1[1]
Gazzang
 
D Cornell Securing Share Point
D Cornell Securing Share PointD Cornell Securing Share Point
D Cornell Securing Share Point
Art Upton
 
Windows 7 Enhanced Security And Control
Windows 7 Enhanced Security And ControlWindows 7 Enhanced Security And Control
Windows 7 Enhanced Security And Control
Keith Combs
 
Windows 7 for IT Professionals
Windows 7 for IT ProfessionalsWindows 7 for IT Professionals
Windows 7 for IT Professionals
Rishu Mehra
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
3 App Compat Win7
3 App Compat Win73 App Compat Win7
3 App Compat Win7
llangit
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate Learning
Acend Corporate Learning
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
sdrayin
 
CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies
CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies
CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies
MorganLudwig40
 
Browser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1OutliBrowser Security – Issues and Best Practices1Outli
Browser Security – Issues and Best Practices1Outli
VannaSchrader3
 
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 OverviewWindows 7 – Application Compatibility Toolkit 5.5 Overview
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Vijay Raj
 
Customized Browser Displaying Multiple Sessions in a Carousel View
Customized Browser Displaying Multiple Sessions in a Carousel ViewCustomized Browser Displaying Multiple Sessions in a Carousel View
Customized Browser Displaying Multiple Sessions in a Carousel View
Mike Taylor
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
Presentologics
 
Gazzang pci v1[1]
Gazzang pci v1[1]Gazzang pci v1[1]
Gazzang pci v1[1]
Gazzang
 
D Cornell Securing Share Point
D Cornell Securing Share PointD Cornell Securing Share Point
D Cornell Securing Share Point
Art Upton
 
Ad

More from blusmurfydot1 (16)

IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05
blusmurfydot1
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12
blusmurfydot1
 
IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04
blusmurfydot1
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01
blusmurfydot1
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05
blusmurfydot1
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12
blusmurfydot1
 
IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07IT103 Microsoft Windows XP/OS Chap07
IT103 Microsoft Windows XP/OS Chap07
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04
blusmurfydot1
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02
blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01
blusmurfydot1
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01
blusmurfydot1
 

IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07

Editor's Notes

  • #3: Outline the material you are going to cover in this lesson. Do not go into detail as each of these points will be expanded on in the lesson. You may also want to mention the Technology Skills that are being covered for the Certification exam also.
  • #4: Introduce Internet Explorer Version 8.
  • #5: These are the topics that will be discussed on the following screens.
  • #6: Explain the purpose of Compatibility View and use the screen shots on the slide to help you to explain how you would add sites to Compatibility View, if you cannot demonstrate. Discuss some of the Group Policy settings that can be configured on an Active Directory Domain.
  • #7: Discuss the 4 types of add-ons supported by IE.
  • #8: Explain that Bing is Microsoft’s default Search Provider when you perform searches in IE. You can add more search providers and select a different default Search providers are Add-ons.
  • #9: Accelerators are another add-on that will allow you to send content to other resources, such as a blog, or to find it on a map. The above screen allows you select other Accelerators to add to IE. The use of Accelerators can also be controlled by Group Policy on an AD DS.
  • #10: RSS Feeds allow users to subscribe to sites with frequently changing content. This allows them to see the new content without having to go to each site. Use the RSS Feeds button in IE (turns RED when a feed is available), and then you can view the content at any time.
  • #11: IE has had problems printing web pages in the past (text cut off). With IE8, there is a Print Preview page will allows users greater flexibility in viewing and formatting pages to be printed.
  • #12: IE 8 includes a number of important security enhancements. These are the topics that will be discussed on the following screens.
  • #13: Explain Protected Mode and why this is a good defense against attackers coming through a web browser connection. The Protected Mode only works with IE8 running on Vista or Windows 7, not XP. Some older web-based applications may not run properly in Protected Mode. You can use Compatibility Logging to see what applications are not running properly and you can Move the site to the Trusted Sites zone, Disable Protected Mode in IE, or Modify the Application (difficult).
  • #14: Explain that with Web-Based applications becoming more common, companies will often use them, but many will require less restricted access to the system than what IE8 will provide in Protected Mode. To provide different levels of access to specific applications, IE divides the addresses accessible with the webbrowser into security zones. Describe each of the 4 zones.
  • #15: Discuss Social Engineering and Phishing. The SmartScreen Filter examines traffic for evidence of Phishing activity and displays a warning to the user. Describe the 3 techniques used by the SmartScreen Filter to identify potential phishing websites.
  • #16: Discuss the type of information that is typically gathered as users browse the Internet (temporary files, cookies and browsing history). Define what InPrivate Mode does for the user and explain the two technologies listed on the screen.
  • #17: Pop-up windows are now a fact of Internet web browsing. Some pop-ups are useful web site controls, most are simply annoying advertisements, and a few can even be dangerous sources of spyware or other malicious programs. Internet Explorer includes a pop-up blocker that you can configure to suppress some or all pop-ups.
  • #18: Discuss good and potentially bad uses of cookies and that some people are uncomfortable with outside parties saving data on their drives for their own purposes.
  • #19: Describe SSL and how they are based on a PKI that come from a CA. When a site is secured, a gold lock appears in the address bar and you can click on the lock to see certificate information.
  • #20: One example of these features, data execution prevention (DEP), prevents applications from executing code in certain areas of memory. Another, mandatory integrity control (MIC), defines four integrity levels that Windows assigns to running processes, which specify the amount of access that the processes receive to system resources. As a result of features like these, some programs that run perfectly well in older versions of Windows, particularly Windows XP and earlier, cannot run on Windows 7.
  • #21: Describe the Program Compatibility Troubleshooter Program and explain the two options shown on the screen shot.
  • #22: Explain the process of setting an executable’s compatibility mode manually, meaning instead of using the Troubleshooter discussed in the last slide.
  • #23: Discuss how enterprise network administrators would usually manage compatibility issues themselves and prefer that end-users do not see the compatibility warnings and try to configure compatibility issues themselves. Group policy can be used to suppress the compatibility warnings, and also can limit users’ access to compatibility mode controls. The two screen shots on the slide display settings for Application Compatibility Diagnostics and Application Compatibility. You can discuss a couple of the options.
  • #24: Describe how the ACT is a collection of programs that enables administrators to gather information about incompatibilities between specific applications and Windows 7, and create customized solutions that enable those applications to run. It is a free download from the MS Download Center. Introduce the tools that will be discussed in the upcoming slides.
  • #25: Designed primarily to help administrators ensure application compatibility for large-scale Windows 7 deployments, Application Compatibility Manager is a tool, shown in the screen shot, that gathers compatibility information and uses it to test your applications for compatibility issues. Describe the three basic steps shown on the screen.
  • #26: Compatibility Administrator, as shown in the screen shot, is a central clearing house for solutions to known compatibility problems for hundreds of commercial Windows 7 applications. When you select an application in the left pane, the right pane lists existing compatibility fixes.
  • #27: The Internet Explorer Compatibility Test Tool is a specialized program that collects compatibility information for web pages and web-based applications. Unlike the Application Compatibility Manager, this is a real time tool that examines the compatibility of the web sites you access with Internet Explorer 8. To use the Internet Explorer Compatibility Test Tool, you simple run the program, click enable, and use Internet Explorer to access the sites you want to test. An icon appears in the IE status bar, indicating that Internet Explorer compatibility evaluation logging is turned on, and log entries begin to appear in the tool’s Live Data window,
  • #28: Describe the purpose of the Setup Analysis Tool.
  • #29: The Standard User Analyzer is a tool that examines applications for compatibility issues caused by the User Account Control (UAC) feature of Windows 7. UAC can prevent applications from accessing resources that were available to them in previous Windows versions. The Standard User Analyzer identifies these resources, using either a manual or wizard-based format.
  • #30: Describe Windows XP Mode and its requirements.
  • #31: Restricting the applications that users can run on their computers is one step towards creating a consistent workstation environment. Workstations that are identically configured are easier to support and limit the possibility of malware infiltration. Windows 7 supports two mechanisms for restricting application, both of which you can deploy using Group Policy settings: software restriction policies and AppLocker. These mechanisms are discussed in the following slides.
  • #32: Introduce Software Restriction Policies. Note that they have been around for a long time. Policies can be set for workstations running different operating systems, like XP and Vista and Windows 7. Rules can only be created manually and individually.
  • #33: Describe the different types of rules that can be created.
  • #34: Describe the 3 rule settings and how to create a secure environment. Also discuss resolving conflicts.
  • #35: Introduce AppLocker and describe why it is better than software restriction policies and what its disadvantages are.
  • #36: Describe the rule types and the criteria used to allow or block access to specific resources.
  • #37: By default, AppLocker blocks all executables, installer packages, and scripts, except for those specified in Allow rules. Therefore, to use AppLocker, you must create rules that enable users to access the files needed for Windows and the system’s installed applications to run. The simplest way to do this is to right-click each of the three rules containers and select Create Default Rules from the context menu. The default rules for each container, as shown in the screen shot, are standard rules that you can replicate, modify, or delete as necessary. You can also create your own rules instead, as long as you are careful to provide access to all the resources the computer needs to run Windows.
  • #38: Describe the great advantage of AppLocker is that when you create a new rule, the wizard starts automatically.
  • #39: Describe the different pieces of information that the wizard prompts the administrator for.
  • #40: Review the Skill Summary to wrap up your lesson.