CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+

Slides:



Advertisements
Similar presentations
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Advertisements

70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
11.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 10: Server Administration.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Lesson 18: Configuring Application Restriction Policies
Performing Software Installation with Group Policy
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Microsoft ® Official Course Module 9 Configuring Applications.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
®® Microsoft Windows 7 for Power Users Tutorial 8 Troubleshooting Windows 7.
Hands-On Microsoft Windows Server 2008
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
Tutorial 11 Installing, Updating, and Configuring Software
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
MCTS Guide to Microsoft Windows 7
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Week #7 Objectives: Secure Windows 7 Desktop
Section 10: Assigning and Publishing Software Packages Using MSI Packages to Distribute Software Using Group Policy as a Software Deployment Method Deploying.
Troubleshooting Windows Vista Security Chapter 4.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Performing Software Installation with Group Policy Lesson 9.
Module 7: Managing the User Environment by Using Group Policy.
Module 7 Configure User and Computer Environments By Using Group Policy.
11 SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL Chapter 9.
Module 5: Configuring Internet Explorer and Supporting Applications.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Administering Group Policy Chapter Eleven. Exam Objectives in this Chapter  Plan a Group Policy strategy using Resultant Set of Policy Planning mode.
5 Lesson 5: Installing and Configuring Desktop Applications and Windows Store Apps MOAC : Configuring Windows 8.1.
Module 8: Managing Software Distribution. Collections Packages Programs Advertisements Collections Packages Programs Advertisements How Software.
Deploying Software with Group Policy Chapter Twelve.
Module 7: Implementing Security Using Group Policy.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Lesson 6: Controlling Access to Local Hardware and Applications
Module 8 Implementing Security Using Group Policy.
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Unit 9 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/17/2016 Instructor: Williams Obinkyereh.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
MANAGING SOFTWARE Chapter 9
Supporting Windows 8.1 Krystle Portocarrero | Training Experts Inc.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Chapter 9 MANAGING SOFTWARE.
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Chapter 10: Supporting and Maintaining Desktop Applications
Unit 9 NT1330 Client-Server Networking II Date: 8/9/2016
Presentation transcript:

CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+

Agenda Chapter 9: Dealing with Software Issues Quiz Exercise

Software Program A sequence of instructions written to perform a specified task for a computer Execute an executable file;.exe or.msi, to install the program

Managing Programs Use the Control Panel’s Programs and Features to ▫Uninstall programs ▫Change a program’s configuration by adding or removing certain options ▫Some program allows you to repair  To change the program, click Change or Repair ▫Administrator privilege is required sometime ▫See Figure 9-1 on Page 174

Program Compatibility Program Compatibility Troubleshooter ▫A wizard that simplifies the process of selecting compatibility mode settings for an executable file Change compatibility settings manually ▫Right-click the program icon -> Properties -> Compatibility tab ▫See Figure 9-2 on Page 176 To suppress application compatibility warnings ▫Computer Configuration\Administrative Templates\System\Troubleshooting and Diagnostics\Application Compatibility Diagnostics

Application Compatibility Toolkit (ACT) To be used to determine before software deployment whether the software is compatible with Windows 7 The tools included in the kit are as follows: ▫Application Compatibility Manager ▫Compatibility Administrator ▫Internet Explorer Compatibility Test Tool ▫Setup Analysis Tool ▫Standard User Analyzer

Application Compatibility Manager Designed for large-scale Windows 7 deployments Collect ▫To collect information from other computers on the network, you create data collection packages (DCPs) Analyze ▫The analysis of the collected data begins with organization, which can include categorization, prioritization, application assessment, and assignment of deployment status Test and Mitigate ▫Test applications and create mitigation strategies, using the Compatibility Administrator application

Compatibility Administrator A main area for solutions to known compatibility problems for hundreds of commercial Windows 7 applications

Software Shim A compatibility fix that consists of a small library that transparently intercepts certain application calls and changes the parameters passed, handles the operation itself, or redirects the operation elsewhere so that the application will operate properly It is usually used for older applications that rely on older functionality that may have been altered for Windows 7

Internet Explorer Compatibility Test Tool Examines the compatibility of the web sites and web-based applications in real time with Windows Internet Explorer 7 and 8

Setup Analysis Tool Logging tool to analyze application setup programs for compatibility issues ▫Installation of 16-bit components ▫Installation of Graphical Identification and Authentication DLLs ▫Changes to files or registry keys that exist under Windows Resource Protection

Standard User Analyzer Examines applications for compatibility issues caused by the User Account Control (UAC) feature of Windows 7 The stand-alone version of SAT can monitor any Windows and third-party installers The Virtual SAT tool can only monitor Windows and third-party installers that run unattended

Windows XP Mode Creates a virtual machine running Windows XP on your Windows 7 system ▫Require Windows 7 Professional, Enterprise, or Ultimate editions Used for applications that will not run any other way Has extensive hardware requirements

Configuring Application Restrictions Restricting the applications that users can run on their computers Two mechanisms for restricting application ▫Group Policy settings: software restriction policies  Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies  Right-click the Software Restriction Polices object -> Create Software Restriction Policies  See Figure 9-3 on Page 182 ▫AppLocker

Using Software Restriction Policies Certificate rules ▫Based on the inclusion of a certificate signed by the software publisher Hash rules ▫Based on a digital fingerprint that remains valid even when the name or location of the executable file changes Network zone rules ▫Identify Windows Installer (.msi) packages downloaded with Internet Explorer based on the security zone of the site from which they are downloaded Path rules ▫Identify applications by specifying a file or folder name or a registry key Default rule ▫Applies when an application does not match any of the other rules

Configuring Rule Settings The three possible settings ▫Disallow ▫Basic User ▫Unrestricted Resolving Conflicts ▫The more specific rule takes precedence over the less specific.  Hash rules  Certificate rules  Path rules  Zone rules

Using AppLocker Application Control Policies New feature in Windows 7 Enterprise and Ultimate Creation of rules is easier than Group Policy ▫Wizard-based Only applies to Windows 7 and Windows Server 2008 R2

Understanding Rule Types Rule Types ▫Executable rules  Contains rules that apply to files with.exe and.com extensions ▫Windows Installer rules  Contains rules that apply to Windows Installer packages with.msi and.msp extensions ▫Script rules  Contains rules that apply to script files with.ps1,.bat,.cmd,.vbs, and.js extensions Criteria for resource access: ▫Publisher ▫Path ▫File Hash

Troubleshooting Applications As with any problem, you should first identify the problem and determine its scope ▫Does the problem occur on one computer only or does it involve multiple computers ▫Determine if it is a local application, a network application or a local application that requires network access to fulfill its task ▫If the application worked before, you then need to ask if anything has changed ▫Check the Event Viewer ▫Verify the configuration of the software. ▫Try to research the problem on the Internet or with the vendor

Assignment Submit these before class over on Thursday ▫Fill in the blank ▫Multiple Choice ▫True / False Submit these before class start on Monday ▫Lab 9 ▫Case Scenario 9-1