MCTS Guide to Microsoft Windows 7

Slides:



Advertisements
Similar presentations
MCTS Guide to Microsoft Windows 7
Advertisements

MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 3 Configuring the Windows Server 2008 Environment.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 10: Server Administration.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 18: Configuring Application Restriction Policies
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Installing software on personal computer
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Working with the Windows XP Registry
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Ch 11. Services A service is a specialized program that performs a function to support other programs Many services operate at a very low level – Interacting.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Module 7: Fundamentals of Administering Windows Server 2008.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Windows NT Chapter 13 Key Terms By Bill Ward NT Versions NT Workstation n A desktop PC that both accesses a network and works as a stand alone PC NT.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
Planning a Group Policy Management and Implementation Strategy Lesson 10.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
MCTS Guide to Microsoft Windows Vista Chapter 12 Application Support.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Module 5: Creating and Configuring Group Policies.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 11 Application Support.
Company Confidential 1 A Course on Planning A Group Policy Management And Implementation Strategy Prepared for: *Stars* New Horizons Certified Professional.
11 PLANNING A GROUP POLICY MANAGEMENT AND IMPLEMENTATION STRATEGY Chapter 10.
Chapter Eleven Windows XP Professional Application Support.
Module 6 Creating and Configuring Group Policy. Module Overview Overview of Group Policy Configuring the Scope of Group Policy Objects Evaluating the.
Lesson 6: Controlling Access to Local Hardware and Applications
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Unit 9 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/17/2016 Instructor: Williams Obinkyereh.
Introduction to Group Policy Lesson 7. Group Policy Group Policy is a method of controlling settings across your network. – Group Policy consists of user.
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems.
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Planning a Group Policy Management and Implementation Strategy
Introduction to Group Policy
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

MCTS Guide to Microsoft Windows 7 Chapter 11 Application Support

Objectives Describe application architecture terminology relevant to Windows 7 Describe supported application environments Describe the Window 7 Registry and know how to manipulate it when necessary Understand file and registry virtualization in conjunction with User Account Control Know how to use the new Run As Administrator feature for applications Understand how Windows 7 provides tweaked compatibility settings to run older applications Describe application compatibility research tools provided by Microsoft Describe application control policies that restrict which applications are allowed to run

Application Architecture Evolved from the traditional Windows NT model Windows 7 operates in a layered approach Different layers provide targeted functionality Conceptual layers add complexity Allow a controlled and secure flow Windows 7 key components Environment subsystems Executive Services

Application Architecture (cont'd.) Executive Services Provide the core operating system functionality that supports executing applications Multiple modules, such as the core kernel, object manager, memory manager, and several others Interact with each other and hardware directly Much hardware-specific knowledge is in the Hardware Abstraction Layer (HAL) service Run in kernel mode

Application Architecture (cont'd.) Environment subsystems Support applications and provide indirect access to Executive Services Work together with the Executive Services to support running applications Run in user mode

Application Architecture (cont'd.)

Supported Application Environments Primary application types and special considerations Win32 Applications NET Applications DOS Applications Win16 Applications x64 Application Considerations

Win32 Applications Most common type of application in use with Windows XP Win32 application runs in its own virtual memory space Executed by the processor in user mode If the Win32 application crashes, it will not affect: Other Win32 applications The operating system’s kernel Executive Services

.NET Applications .NET Framework Preferred method for applications to access operating system services Ensures compatibility with future operating systems Isolates applications from any changes to the Win32 subsystem

DOS Applications 32-bit versions of Windows 7 support the execution of legacy DOS applications When a legacy DOS application runs ntvdm.exe is started to create a Virtual DOS Machine (VDM) environment for the DOS application DOS application appears to be running on a DOS computer Access to computer hardware is virtualized through ntvdm.exe and the Win32 subsystem A new instance of ntvdm.exe is created for each DOS application that is executed

Win16 Applications Win16 applications were originally designed to run with Windows 3.x By default, a single Virtual DOS Machine is created to run all Win16 applications Instance of ntvdm.exe combined with Windows 3.x core operating system files An application shim called wowexec.exe Part of Windows 7 operating and supports Win16-on-Win32 execution Applications cannot directly transfer information to the 32-bit Windows 7

Win16 Applications (cont'd.) Thunking Translation of requests for service from the Win16 environment to 32-bit and vice-versa All Win16 applications run in a single VDM by default Any one application that crashes can crash all other Win16 applications running with it in the VDM Win16 environment can take a lot of time to initialize the first time it is started Once a Win16 VDM is created, it is not immediately shut down when all Win16 applications terminate

x64 Application Considerations x64 version of Windows 7 For use with new applications for 64-bit processors Application compatibility is limited to Win32 application Win32-on-Win64 (WOW64) virtualized environment is created to host legacy Win32 applications

Windows 7 Registry Registry Structure and security needed to centrally manage an application configuration and operational parameters Windows 3.x introduced the concept of a registry Windows 95 registry became a well defined and centrally required element In the operations of the operating system and applications

Registry Structure Registry is divided into sections and levels of data Multiple sections exist to organize data by purpose Individual sections are called hives Within a single hive, data is stored in keys and values Identified by name and position relative to each other Registry keys can contain sensitive information that can crash the computer If improperly configured

Registry Editor Window

Registry Structure (cont'd.) Registry maintains its own security settings To restrict which entities can read or change keys HKEY_CLASSES_ROOT Settings define the types (classes) of documents and properties associated with those types HKEY_CURRENT_USER Settings in this hive define the preferences of the currently logged-on user

Registry Structure (cont'd.) HKEY_LOCAL_MACHINE Global settings for entire computer and applications HKEY_USERS Multiple subsections to define user-specific settings for new users and any user who ever logged on HKEY_CURRENT_CONFIG Details about the current hardware profile in use

Registry Editing Tools REGEDIT.EXE Graphical Registry editor Allows user to: Connect to the active registry database Make changes that are effective immediately REG.EXE Command-line tool Used to read data from or write data to the registry from inside a scripted batch or command file Requires intimate knowledge of the registry’s hierarchy and values

Registry Editing Tools (cont'd.)

Registry Editing Tools (cont'd.)

Registry Backup and Restore Methods Both REGEDIT.EXE and REG.EXE Can export the current settings from part of the registry database to a text-based file File has a .REG extension Backing up the entire registry Perform a complete PC backup Including the system state of the operating system A user may import a .REG file

Registry Security Registry database is protected by its own security system Each key is assigned permissions, an owner, and optionally a list of users to audit when the key is accessed Access to a registry key and the values it contains can be explicitly allowed or denied Based on the user or the groups they belong to Basic permissions usually do not reveal all of the fine security details that exist

Registry Security (cont'd.)

Registry Security (cont'd.)

Registry Security (cont'd.) Security settings are inherited from the top of the hive down to the bottom of the hive Permission inheritance and default security options should not be changed Without a good reason to do so Owner of the keys is usually listed as SYSTEM In Windows 7, the operating system code and services run in a user session If registry permissions are altered, the registry data may not be available to the operating system

File and Registry Virtualization Some pre-Windows Vista applications store data and configuration settings In file and registry locations not meant for this purpose With User Account Control Windows 7 can distinctly recognize and control access to sensitive system areas 32-bit version of Windows 7 has virtualized select system file and registry areas

File and Registry Virtualization (cont'd.) Key system areas that are virtualized include: HKLM\Software %SystemRoot% %ProgramFiles% UAC-aware applications can include an XML file called the application manifest Can identify the application as UAC aware, which disables UAC file and registry virtualization automatically for that application

Run As Administrator Applications run with the same security privileges as the currently logged-on user Run As option existed to run an application as a different user Modified in Windows 7 Now known as the Run As Administrator option Details of the security privileges for the currently logged-on user are stored in a security token Compiled when the user first logs on Useful when a program must run at an elevated level

Application Compatibility Some applications designed for older operating systems will not work smoothly with Windows 7 Compatibility options Windows 7 can emulate an operating system closer to what the application was first written for Windows 7 can try to emulate a range of older Windows OS environment Compatibility setting can be configured using: Program Compatibility Assistant Manually through Program Compatibility Settings

Program Compatibility Assistant When an application is run for the first time Windows 7 automatically checks if the application has an issue If there is an issue, the Program Compatibility Assistant will launch the next time the same application runs Program Compatibility Assistant Designed to make it easy for users to adjust their legacy applications to work with Windows 7 Without having to know a lot about compatibility settings

Program Compatibility Assistant (cont'd.)

Program Compatibility Assistant (cont'd.)

Program Compatibility Settings Once an application is installed It can optionally have its compatibility settings adjusted as part of its properties Program’s compatibility settings can be viewed and changed through the Compatibility tab in the program’s Properties window

Program Compatibility Settings (cont'd.)

XP Mode Installs a second virtual operating system that runs at the same time as Windows 7 Made possible by installing a free copy of Virtual PC and operating system enhancements Has specific enhancements that link applications between Windows 7 and Windows XP Copy of Windows XP in the virtual machine still needs to be managed and protected

Kernel Patching Kernel patching System whereby applications modify the core functionality of the Windows operating system To obtain low-level access to the operating system and its resources Considered a security risk Can cause operating system instability if not done properly Windows 7 prevents kernel patching by untrusted applications

Application Compatibility Research Tools Primary compatibility research tool: Microsoft Application Compatibility Toolkit (ACT) V5.5 Microsoft ACT V5.5 is currently available as a free download from Microsoft Tool is a lifecycle management tool for the applications required by a user or company Assists in identifying and managing which applications must be reviewed

Application Compatibility Research Tools (cont’d.) Application Compatibility Manager Administrative console that the IT administrator uses to control the overall discovery, collection, and analysis process Compatibility Administrator Tool for the IT administrator to collect and resolve compatibility issues Standard User Analyzer Tool that monitors what happens when an application is run as a user without elevated permissions

Application Compatibility Research Tools (cont’d.) Setup Analysis tool Observes what steps and changes are made during the installation of an application Internet Explorer Compatibility Test Tool Monitors what happens when a Web site is opened in Internet Explorer 7 or 8 Microsoft Compatibility Exchange Allows the Application Compatibility Manager to connect to external knowledge bases Application shims can be used to interact between the application and the operating system

Application Control Policies Getting applications to run is only part of the IT administrator’s role Control policies available to the IT administrator include: Software Restriction Policies AppLocker

Software Restriction Policies Implemented as part of a management strategy For Windows XP workstations that are domain-joined to a Windows Server 2003 domain Typically created using an MMC Group Policy snap-in on an Active Directory domain server to create a Group Policy Object (GPO) Mistake can have serious consequences to the ability of workstations to operate Default behavior is set to allow all applications to run by default

Software Restriction Policies (cont’d.)

Software Restriction Policies (cont’d.) Additional rule types that can be created as exceptions include: Hash Rule Path Rule Internet Zone Rule Certificate Rule Registry Key Rule Software restriction policies know about most executable file types based on their file extension Restriction policies are delivered by Group Policy

Software Restriction Policies (cont’d.)

Software Restriction Policies (cont’d.)

AppLocker Choice of applications has changed with time AppLocker Replacement management strategy for limiting applications allowed to run Relies on Group Policy Objects just as the older software restriction policies do Advantage in using AppLocker Works better as a management strategy with the current application landscape

Summary Application architecture and its layers as they apply to the execution of the user’s applications and the operating system itself Different application environments are supported for DOS, Win16, and Win32 in the 32-bit version of Windows 7 Registry in Windows 7 is based on the original Windows NT registry model Select portions of the file system and registry are virtualized so that a running application believes it is writing to those locations

Summary (cont'd.) Applications that require administrative privileges to run properly can be granted to Run as administrator Legacy applications that have trouble running natively in Windows 7 can run in a compatibility mode that simulates an older version of Windows Application compatibility is not a one-time operation that is only performed when a new operating system is introduced