240 likes | 313 Views
CN1176 Computer Support. Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS , MCDST, MCP, A+. Agenda. Chapter 7: Working with Applications Exercise / Lab Quiz. Configuring Internet Explorer 8. Compatibility view Change manually or via Group policy RSS feeds
E N D
CN1176Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Agenda • Chapter 7: Working with Applications • Exercise / Lab • Quiz
Configuring Internet Explorer 8 • Compatibility view • Change manually or via Group policy • RSS feeds • Automatically retrieves new content from the content provider • Printing with IE
Configuring Internet Explorer 8 • Managing add-ons • Separate software components • The four basic types of add-ons supported by IE are as follows: • Toolbars and Extensions • Search Providers • Accelerators • Enable users to send content to other resources, in the form of applications running on the computer or other sites on the Internet • InPrivate Filtering • Enables you to import and export XML files containing InPrivate filters
Securing Internet Explorer • Protected Mode • Prevent attackers • Mandatory Integrity Control (MIC) assigns various integrity access levels to processes running on the computer • High (Admin), Medium (User), Low (Untrusted) • Only works with IE8 running on Vista or Windows 7, not XP
Securing Internet Explorer (Cont.) • Security Zones • Internet • Default Zone for all sites • Run in protected mode and have minimal access • Local Intranet • Do not run in protected mode and have significant access • Trusted Sites • Most elevated set of privileges and is intended for sites that you can trust not to damage the computer • Restricted Sites • Most reduced set of privileges and runs in protected mode
Securing Internet Explorer • SmartScreen Filter • Warn if there is phishing activity • InPrivateMode • InPrivateBrowsing • Prevents IE from maintaining a permanent record of the user’s activities during browsing session • InPrivateFiltering • Enables you to block content providers from gathering your information
Securing Internet Explorer • Pop-Up Blocker • Privacy Settings • Use privacy settings to limit the ability of Web sites to create cookies • Browsing with Certificates • Secure Sockets Layer (SSL) with digital certificate
Troubleshooting Program Compatibility • Program Compatibility Troubleshooter • a wizard-based solution • Tries to determine why an application is not running properly and gives you two options • Try Recommended Settings • Automatically configure and run the software with compatibility settings • Troubleshoot Program • A help wizard that lead you through series of questions
Setting Compatibility Modes • Can set compatibility modes manually through the executable’s Properties sheet
Configuring Application Compatibility Policies • To suppress the compatibility warnings • Limit users’ access to compatibility mode controls • Notify blocked drivers • Detect application installers that need to be run as administrator • Remove Program Compatibility Property Page
Using the Application Compatibility Toolkit • A collection of programs to help you gather information and create solutions • Application Compatibility Manager • Compatibility Administrator • Internet Explorer Compatibility Test tool • Setup Analysis tool • Standard User Analyzer
Application Compatibility Manager • Designed for large-scale Windows 7 deployments • Collect • To collect information from other computers on the network, you create data collection packages (DCPs) • Analyze • The analysis of the collected data begins with organization, which can include categorization, prioritization, application assessment, and assignment of deployment status • Test and Mitigate • Test applications and create mitigation strategies, using the Compatibility Administrator application
Compatibility Administrator • A main area for solutions to known compatibility problems for hundreds of commercial Windows 7 applications
Internet Explorer Compatibility Test Tool • Examines the compatibility of the web sites
Setup Analysis Tool • Logging tool to analyze application setup programs for compatibility issues • Installation of 16-bit components • Installation of Graphical Identification and Authentication DLLs • Changes to files or registry keys that exist under Windows Resource Protection
Standard User Analyzer • Examines applications for compatibility issues caused by the User Account Control (UAC) feature of Windows 7
Using Windows XP Mode • Creates a virtual machine running Windows XP on your Windows 7 system • Used for applications that will not run any other way • Has extensive hardware requirements
Configuring Application Restrictions • Restricting the applications that users can run on their computers • Two mechanisms for restricting application • Group Policy settings: software restriction policies • AppLocker
Using Software Restriction Policies • Certificate rules • Based on the inclusion of a certificate signed by the software publisher • Hash rules • Based on a digital fingerprint that remains valid even when the name or location of the executable file changes • Network zone rules • Identify Windows Installer (.msi) packages downloaded with Internet Explorer based on the security zone of the site from which they are downloaded • Path rules • Identify applications by specifying a file or folder name or a registry key • Default rule • Applies when an application does not match any of the other rules
Configuring Rule Settings • The three possible settings • Disallow • Basic User • Unrestricted • Resolving Conflicts • The more specific rule takes precedence over the less specific. • Hash rules • Certificate rules • Path rules • Zone rules
Using AppLocker • Application Control Policies • New feature in Windows 7 Enterprise and Ultimate • Creation of rules is easier than Group Policy • Wizard-based • Only applies to Windows 7 and Windows Server 2008 R2
Understanding Rule Types • Rule Types • Executable rules • Contains rules that apply to files with .exe and .com extensions • Windows Installer rules • Contains rules that apply to Windows Installer packages with .msi and .msp extensions • Script rules • Contains rules that apply to script files with .ps1, .bat, .cmd, .vbs, and .jsextensions • Criteria for resource access: • Publisher • Path • File Hash
Assignment • Matching • Multiple Choice • Case Scenario 2