Microsoft ® Official Course Module 9 Configuring Applications.

Slides:



Advertisements
Similar presentations
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Advertisements

Module 5: Creating and Configuring Group Policy
Managing User Settings with Group Policy
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Lesson 18: Configuring Application Restriction Policies
Module 8: Implementing Administrative Templates and Audit Policy.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Module 6 Securing Windows 7 Desktops. Module Overview Overview of Security Management in Windows 7 Securing a Windows 7 Client Computer by Using Local.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Module 1: Installing Windows XP Professional. Overview Manually Installing Windows XP Professional Automating a Windows XP Professional Installation Using.
Securing Windows Servers Using Group Policy Objects
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Corso referenti S.I.R.A. – Modulo 2 07 – Group Policy 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Microsoft ® Official Course Module 13 Troubleshooting and Recovering Windows 8.
Microsoft ® Official Course Module 2 Upgrading and Migrating to Windows 8.
Module 4: Add Client Computers and Devices to the Network.
Implementing File and Print Services
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Securing Microsoft® Exchange Server 2010
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Managing Active Directory Domain Services Objects
Microsoft ® Official Course Module 10 Optimizing and Maintaining Windows ® 8 Client Computers.
Week #7 Objectives: Secure Windows 7 Desktop
Implementing Update Management
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Implementing Network Access Protection
Configuring Encryption and Advanced Auditing
Module 15: Manage the Windows ® Small Business Server 2008 Environment Using Group Policy.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Managing User Desktops with Group Policy
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
Module 6: Implementing Group Policy. Overview Implementing Group Policy Objects Implementing GPOs in a Domain Managing the Deployment of Group Policy.
Module 6: Configuring User Environments Using Group Policy.
Module 7: Managing the User Environment by Using Group Policy.
Implementing Group Policy. Overview What is Group Policy Introduction to Group Policy Group Policy Structure How Group Policy Settings Are Applied in.
Module 5: Configuring Internet Explorer and Supporting Applications.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Module 3: Managing a Microsoft ® Windows ® Small Business Server Environment.
Module 7 Planning and Deploying Messaging Compliance.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Module 5: Creating and Configuring Group Policies.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Implementing Group Policy
Module 7: Implementing Security Using Group Policy.
NetTech Solutions Security and Security Permissions Lesson Nine.
Module 10: Windows Firewall and Caching Fundamentals.
Implementing a Group Policy Infrastructure
Module 9 Planning and Implementing Monitoring and Maintenance.
Module 10: Implementing Administrative Templates and Audit Policy.
Module 6: Configuring User Environments Using Group Policies.
Lesson 6: Controlling Access to Local Hardware and Applications
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Supporting Windows 8.1 Krystle Portocarrero | Training Experts Inc.
Supporting Windows 8.1 Krystle Portocarrero | Training Experts Inc.
Troubleshooting Applications
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Utilize Group Policy Terminal Server Settings
Preparing for the Windows 8.1 MCSA
Presentation transcript:

Microsoft ® Official Course Module 9 Configuring Applications

Module Overview Install and Configure Applications Managing Apps from the Windows Store Configuring Internet Explorer Settings Configuring Application Restrictions in the Enterprise

Lesson 1: Install and Configure Applications Installing Applications in Windows 8 Configuring Default Program Settings Application Compatibility Issues Resolving Common Application-Compatibility Issues Discussion: When to Use Office 365

Installing Applications in Windows 8

Configuring Default Program Settings You can configure Default Program behavior by selecting Control Panel > Programs > Default Programs

Application Compatibility Issues Common application compatibility problems may relate to the following areas: Setup and installation of applications User Account Control Windows Resource Protection Internet Explorer Protected Mode 64-bit architecture Windows Filtering Platform Operating system version changes Kernel-mode drivers

Resolving Common Application-Compatibility Issues Common mitigation methods include: Modifying the application configuration Applying updates or service packs Upgrading the application Modifying the security configuration Running the application in a virtualized environment Using application compatibility features built into the operating system Selecting another application Apply a shim

Discussion: When to Use Office 365 When would you consider implementing Office 365?

Lesson 2: Managing Apps from the Windows Store What Is the Windows Store? Managing Access to Windows Store What Is Sideloading?

What Is the Windows Store? The Windows Store provides a convenient, single location for users to access and download apps

Managing Access to Windows Store Use Group Policy to disable the Store application

What Is Sideloading? Sideloading provides a mechanism for distribution of LOB apps to your client computers without using the Windows Store You must enable the sideloading facility by editing GPO settings Your LOB apps must be digitally signed You can use either dism.exe or Windows PowerShell to add, list, or remove LOB apps

Lesson 3: Configuring Internet Explorer Settings What Is Compatibility View? Privacy Features The SmartScreen Feature Other Security Features Demonstration: How to Configure Internet Explorer

What Is Compatibility View? None of the improvements in Internet Explorer 10 matter if websites look bad or work poorly Compatibility View helps display a webpage as it is meant to be viewed

Privacy Features InPrivate Browsing is inherently more secure than using Delete Browsing History to maintain privacy because there are no logs kept or tracks made during browsing Tracking Protection helps monitor the frequency of all third-party content as it appears across all web sites visited by the user Delete Browsing History enables users and organizations to selectively delete browsing history

The SmartScreen Feature

Other Security Features Per-user ActiveX makes it possible for standard users to install ActiveX controls in their own user profile, without requiring administrative privileges Per-site ActiveX enables IT professionals to use Group Policy to preset allowed controls and their related domains XSS Filter identifies and neutralizes a cross-site scripting attack if it is replayed in the server’s response DEP/NX protection helps thwart attacks by preventing code from running in memory that is marked nonexecutable

Demonstration: How to Configure Internet Explorer In this demonstration, you will see how to: Enable Compatibility View for all websites Delete browsing history Configure InPrivate browsing View add-on management interface Manage downloads with the download manager

Lab A: Configuring Internet Explorer Security Exercise 1: Configuring Windows Internet Explorer Logon Information Virtual Machines20687B-LON-DC B-LON-CL1 User NameAdatum\Administrator PasswordPa$$w0rd Estimated Time: 15 minutes

Lab Scenario Holly Dickson is concerned about her users’ security settings when they are browsing the Internet, especially if they are browsing the Internet while connected to their customer’s networks. She has asked that you investigate improving the security settings on her users’ computers in Internet Explorer.

Lab Review In the lab, you added the local intranet home page to the Trusted sites. How else could you have ensured that the required ActiveX controls did run?

Lesson 4: Configuring Application Restrictions in the Enterprise What Is AppLocker? AppLocker Rules Demonstration: How to Configure AppLocker Rules Demonstration: How to Enforce AppLocker Rules

What Is AppLocker? Benefits of AppLocker Controls how users can access and run all types of applications Ensures that user desktops are running only approved, licensed software AppLocker is a security feature that enables you to specify exactly what applications are allowed to run on user desktops

AppLocker Rules Default rules enable the following: All users to run files in the default Program Files directory All users to run all files signed by the Windows operating system Members of the built-in Administrators group to run all files Create default AppLocker rules first, before manually creating new rules or automatically generating rules for a specific folder Create custom rules and automatically generate rules using an AppLocker wizard found in the Local Security Policy Console

Demonstration: How to Configure AppLocker Rules In this demonstration, you will see how to: Create new executable rule Automatically generate Script rules

Demonstration: How to Enforce AppLocker Rules In this demonstration, you will see how to: Enforce AppLocker Rules Confirm the executable rule enforcement Confirm the Script rule enforcement

Lab B: Configuring AppLocker Exercise 1: Configuring AppLocker Rules Exercise 2: Testing the AppLocker Rules Logon Information Virtual Machines20687B-LON-DC B-LON-CL1 User NameAdatum\Administrator PasswordPa$$w0rd Estimated Time: 20 minutes

Lab Scenario Holly is concerned that people in her department are spending time listening to music files. She wants a way to disable the Windows Media ® Player from running. You decide to implement AppLocker ® to prevent members of the IT group from running this program.

Lab Review In the lab, you configured an executable path for the executable rule. What could you do if you wanted to allow users to run an earlier version of Windows Media Player?

Module Review and Takeaways Review Questions Tools Best Practice