Windows Vista Configuration MCTS 70-620: Network Security.

Slides:



Advertisements
Similar presentations
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
AVG Internet Security 7.5 Product presentation.
Module 5: Configuring Access for Remote Clients and Networks.
Chapter 9: Configuring Internet Explorer. Internet Explorer Usability Features Reorganized user interface Instant Search box RSS support Tabbed browsing.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Chapter 6: Configuring Security. Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Lesson 19: Configuring Windows Firewall
1 Enabling Secure Internet Access with ISA Server.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
With Internet Explorer 9 Getting Started© 2013 Pearson Education, Inc. Publishing as Prentice Hall1 Exploring the World Wide Web with Internet Explorer.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Hands-On Microsoft Windows Server 2008
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Implementing Network Security
Hacker Zombie Computer Reflectors Target.
Using Windows Firewall and Windows Defender
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Separate your corporate environment from unknown threats of the WEB. Define trusted WEB policy. Enforce the use of WEB browsers. Automatically distribute.
Troubleshooting Windows Vista Security Chapter 4.
Windows 7 Firewall.
Windows Security. Security Windows 2000/XP Professional security oriented Authentication Authorization Internet Connection Firewall.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
C HAPTER 2 Introduction to Windows XP Professional.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 5: Configuring Internet Explorer and Supporting Applications.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Module 5: Designing Security for Internal Networks.
Lesson 11: Configuring and Maintaining Network Security
Module 7: Implementing Security Using Group Policy.
NetTech Solutions Protecting the Computer Lesson 10.
Lecture 12 Windows Firewall and Action Center. Firewalls Protect networks by stopping network traffic from passing through it Implemented as either a.
Module 10: Windows Firewall and Caching Fundamentals.
Internet safety By Suman Nazir
W elcome to our Presentation. Presentation Topic Virus.
Module 8 Implementing Security Using Group Policy.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Chapter 6 Application Hardening
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Information Security Session October 24, 2005
Securing Windows 7 Lesson 10.
Windows Firewall Adem Enes POLAT
Presentation transcript:

Windows Vista Configuration MCTS : Network Security

Spyware Generate annoying pop-ups Monitor keystrokes Scan files on the hard drive Snoop other applications such as chat programs or word processors Install other spyware programs Read cookies Change the default home page on the web browsers other links or default pages Open your computer to be accessed by others

Reduce your chance of being affected by Spyware: Use a good antivirus package Use spyware-detecting and -removal programs Be sure that your machine has all security patches and fixes loaded Install software only from sources and websites you trust Be careful about what software you install on your system Keep your web browser security settings to Medium or higher Install or enable a personal firewall Use pop-up blockers

Windows Defender Real-time protection Scanning options SpyNet community

Windows Defender Security Agents Microsoft Internet Explorer Configuration Internet Explorer Downloads Internet Explorer Add-Ons (Browser Helper Objects) Auto Start System Configuration Services and Drivers Windows Add-Ons Application Execution Application Registration (API Hooks)

Automatic Scanning Quick Scan Full Scan Custom Scan

Windows Defender Options Ignore Quarantine Remove Always Allow

Software Explorer in Windows Defender

Windows Firewall Windows Firewall is a packet filter and stateful host-based firewall. A packet filter protects the computer by using an access control list (ACL). A stateful firewall monitors the state of active connections and uses the information gained to determine which network packets are allowed through the firewall.

Windows Firewall Inbound rules Outbound rules Connection-specific rules

Windows Firewall Improvements IPv6 connection filtering Outbound packet filtering Rules can be configured for individual services chosen from a list without needing to specify the full path filename. Internet Protocol Security (IPSec) is fully integrated with Windows Firewall to make sure there is not a conflict between IPSec and firewall settings. Capability to have separate firewall profiles when computers communicating on a Windows domain are connected to the Internet (public) or private network.

Basic Configuration

Windows Firewall Settings Interface General Turn Windows Firewall on and off. Block all incoming connections. Exceptions Specify which programs and services are allowed through. Never create an exception when unsure about functionality. Advanced Select which network interfaces will be protected.

Advanced Configuration Inbound rules Outbound rules Connection security rules Monitoring

Inbound and Outbound Rules Inbound rules can prevent… Unwanted software being copied to your computer Unknown or unsolicited access to data on your computer Unwanted configuration of your computer Outbound rules can prevent… Programs including malware from accessing network resources Programs including malware from downloading software Users downloading software

Configuration Settings Tabs General Programs and Services Users and Computers Protocols and Ports Scope Advanced

Rule Types Isolation Authentication exemption Server to Server Tunnel Custom