1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
1 of 2 By observing the guidelines below and performing regular maintenance on your computer, you can help keep your computer safe and maintain optimum.
1 of 4 Malicious software, also known as “malware,” is often only a nuisance, but increasingly, malicious software can damage data, computers, and computer.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Windows Security Larry MacPhee Why Security Matters Public nuisance Loss of productivity –The cost of spam!The cost of spam! Loss of data.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Patricia O’Brien30 June 2015 Housekeeping your PC Training Session for XP and VISTA.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
XP 1 New Perspectives on Microsoft Windows XP, 2005 Service Pack 2 Update Appendix D Microsoft Windows XP, Service Pack 2 Update Appendix D – Setting Up.
COMPREHENSIVE Excel Tutorial 8 Developing an Excel Application.
Windows Tutorial 9 Maintaining Hardware and Software
Windows Update Jonathan Scott. What is Windows Update? Windows Update is an online program on the Microsoft Website that updates your computer. You can.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Using Windows Firewall and Windows Defender
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
Tutorial #1. Lab#: 1 Securing your system Lab 1.2: Tenable Nessus Nessus currently works on Windows, Linux, and Mac. It is a vulnerability scanner, which.
Chapter 4 Initial Configuration Tasks. Understanding the Initial Configuration Tasks window Microsoft now provides a new feature, the Initial Configuration.
1. Chapter 25 Protecting and Preparing Documents.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Computing Fundamentals Module Lesson 3 — Changing Settings and Customizing the Desktop Computer Literacy BASICS.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Small Business Security Keith Slagle April 24, 2007.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
 How to install and Activate Kaspersky Endpoint Security 10  How to block usb drives and CD/DVD drives  How to manually update Virus definition  How.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Windows Tutorial 5 Protecting Your Computer
Information Systems Desktop Support
Services Course 9/9/2018 3:37 PM Services Course Windows Live SkyDrive Participant Guide © 2008 Microsoft Corporation. All rights reserved.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
Information Security Session November 11, 2004
Information Security Session October 24, 2005
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Cybersecurity and Cyberhygiene
Presentation transcript:

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All rights reserved. Every company computer is a gateway to the corporate network. Employees must guard these gateways against those outside the network who might try to gain access to corporate resources. By following the best practices in this guide, you can help protect against potential internal and external threats. Install Updates Immediately Keep your software up-to-date at home and at the office. Microsoft® Windows® Automatic Updates are recommended as a way of ensuring you always have the latest critical updates. To use Automatic Updates, click Start>Control Panel>System. On the Automatic Updates tab, click Automatic (recommended) and then choose an install time and frequency. Use Strong Passwords Choose a password that’s easy for you to remember but hard for others to guess. Strong password requirements include the following: are at least eight characters long; use both upper and lower case characters, digits, and punctuation marks; do not contain actual words in any language, slang, dialect, or jargon; and are not based on personal or family names. Add a Password to Your Screen Saver Use your Windows password in combination with your screen saver to prevent access to your computer when you are away. Set the screen saver to appear no more than 15 minutes after your last activity. Click Start>Control Panel>Display, click the Screen Saver tab, and then select the On resume, password protect check box. Lock Your Computer When You’re Away Whenever you step away from your computer, press CTRL+ALT+DEL and then click Lock Computer. (Or press Windows logo key+L.) This locks your computer and prevents anyone without your password from gaining access to the system. Use Antivirus and AntiSpyware Software Install antivirus software on your computer, download the latest signature file, and immediately perform a complete scan of all files. After ensuring your system is clean, configure the antivirus program to scan all incoming and outgoing files in real-time. Download virus signatures frequently, and if you deactivate the program for any length of time, perform a full-system scan on restarting. Protect your computer from spyware and other harmful software—download and install a spyware scanner here: Note To check for non-critical updates for Windows, go to ft.com. If you have Microsoft Office, you will need to go to to check for updates. ft.com

2 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation. All rights reserved. Check your System for Weaknesses Use the Microsoft Baseline Security Analyzer (MBSA) to measure how secure your system is. The MBSA is a vulnerability assessment tool for Microsoft Windows that scans your system and provides a list of recommendations to improve security. You can download the MBSA free of charge at Install Only From Trusted Sources Do not install programs from the Internet unless you are familiar with their sources. This includes freeware and shareware, which are at high risk for containing malicious code. Installing software from untrusted sources can compromise your system and put other computers on the corporate network at risk. Encrypt Files and Folders If you have highly sensitive personally identifiable information (PII) or highly sensitive business information on your computer, encrypt it using Encrypting File System (EFS). Dedicate a separate folder for encrypted content and name it something like “Secure.” This way, when you encrypt the folder, you can ensure that all files and subfolders within that folder are automatically encrypted too. To encrypt a folder and its contents: right-click the folder you wish to encrypt and click Properties. On the General tab, click Advanced. In the Advanced Attributes dialog box, select Encrypt contents to secure data. When prompted, select the option to encrypt all files and subfolders within the folder. To decrypt the folder, click to clear the Encrypt contents to secure data check box. Use Windows XP Professional at Work and Home Windows XP Professional with Service Pack 2 (SP2) is recommended for use both at work and at home due to its improved security features, including the Windows Firewall and encryption for files and personal documents. Protect your Documents with Passwords To protect a Microsoft Word, Microsoft Excel, or Microsoft PowerPoint® file with a password, within the file click Tools>Options, click the Security tab, and in the Password to open box, enter the password you want to assign. This ensures that only a person with the password will be able to open the file. Note If you plan to share the Word document or Excel file, select the Read-only recommended check box for the highest level of security. This option is not available in PowerPoint.