Windows 7. Qing Liu Michael Stevens
|
|
- Donna Summers
- 8 years ago
- Views:
Transcription
1 Windows 7 Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org 1
2 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes 5. Kernel Changes 6. Audit changes 7. New and Changed Security Options 2
3 Section 1: Financial Institution s Preliminary Steps 3
4 Learning Objectives In this module you will learn: Preliminary Steps on migration How to determine if a PC is Windows 7 ready What features the various versions of Windows 7 provide to the FI. 4
5 To Migrate or Not to Migrate? Plan now Start migration before 2012 Windows XP expires in
6 Preliminary Migration Steps Planning and rollout Hardware upgrades Application compatibility evaluation New applications Office 2007 consideration Training 6
7 Hardware Requirements 32-bit Processor 1 GHz 1 GHz Processor Type 32bit x86 or better, such as 64 bit 64 bit RAM 1 GB 2 GB Hard Disk Space 16 GB 20 GB Graphics DirectX 9 device with WDDM 1.0+ driver 64-bit DirectX 9 device with WDDM 1.0+ driver Note: The 64-bit edition of Windows offers better performance, but has additional system requirements (notably a 64-bit processor), needs different hardware drivers, and thus requires additional testing for hardware and software compatibility. 7
8 Windows 7 Versions Feature Home Premium Professional Ultimate Make the things you do every day easier with improved desktop navigation. Start programs faster and more easily, and quickly find the documents you use most often. Make your web experience faster, easier and safer than ever with Internet Explorer 8. Run many Windows XP productivity programs in Windows XP Mode. Help protect data on your PC and portable storage devices against loss or theft with BitLocker. 8
9 Windows 7 Enterprise Direct Access ( Security) BranchCache Federated Search BitLocker and BitLocker-to-Go (Security) AppLocker (Security) Virtual desktop infrastructure (VDI) optimizations Multilingual user interface 9
10 Windows 7 Readiness Download Windows 7 Upgrade Advisor Run Hardware / software compatibility report Windows 7 Upgrade Advisor link
11 Section 2: User Interface 11
12 Learning Objectives In this module you will: Describe Windows 7 s Graphical User Interface options List new features Become familiar with Windows XP Mode integrated virtualization 12
13 Changes to Windows Aero New taskbar: right-click applications to see new tasks 13
14 Changes to Windows Aero Taskbar Thumbnails: Quickly preview the content of each open window, not merely the name 14
15 Changes to Windows Aero Aero Peek: hover over lower-right corner of screen to reveal desktop temporarily 15
16 Live Icons 16
17 Flip 3D 17
18 Getting Started 18
19 Start Menu and Search Many elements of Windows 7 incorporate new search capabilities. Search box Libraries Ability to Save Searches 19
20 Demo Search 20
21 Libraries 21
22 Gadgets Gadgets mounted to the Desktop Gadget selection window 22
23 How about old applications running on XP? 23
24 XP Mode Processor: Processor capable of hardware virtualization, with AMD-V or Intel VT turned on in the BIOS. Memory: 2GB of memory recommended. Hard disk requirement: 20MB hard disk space for installing Windows Virtual PC. Additional 15GB of hard disk space per virtual Windows environment recommended.
25 Section 3: Data Protection 25
26 Learning Objectives In this module you will learn: The current threats Authentication and encryption features Trusted Platform Module Rights Management Service Encrypted Files System BitLocker / BitLocker to go 26
27 Current Threats Threats to data Password recovery programs are widely available that enable offline attacks Offline attacks expose core system keys that allow for the compromise of secured data Hundreds of thousands of laptops are lost every year Software Based Security 27
28 Trusted Platform Module (TPM) Module on the motherboard Performs cryptographic functions Can create, store and manage keys Performs digital signature operations Source: 28
29 Multi-Factor Authentication Three authentication factors: Factor Something you have Something you know Something you are Example USBToken, or TPM chip Password Fingerprint SINGLE-FACTOR: MULTI-FACTOR: Something you have (TPM chip) Something you have (TPM chip) Something you have (TPM chip and token) Something you know (password) ******* 29
30 Three Windows 7 Applications RMS, EFS, and BitLocker Three levels of protection: Rights Management Services (RMS) Per-document enforcement of policy-based rights Encrypting File Systems (EFS) Per file or folder encryption of data for confidentiality BitLocker Full Volume Encryption Per volume encryption (see earlier) 30
31 Rights Management Services (RMS) Rights Management Services embeds usage policies in documents to control their use Protecting confidential messages Enforcing document rights Distributing media content RMS components RMS-enabled application Client SW Server SW 31
32 Encrypting File System (EFS) Only files and folders on NTFS volumes can be encrypted. Encrypted files can become decrypted if you copy or move the file to a volume that is not an NTFS volume. Moving unencrypted files into an encrypted folder will automatically encrypt those files in the new folder. However, the reverse operation will not automatically decrypt files. Files must be explicitly decrypted. 32
33 Encrypting File System (EFS) 33
34 BitLocker & BitLocker To Go 34
35 Video Bitlocker 35
36 Who are you protecting against? Other users or administrators on the machine? EFS Unauthorized users with physical access? BitLocker Scenarios BitLocker EFS RMS Laptops Branch office server Local single-user file & folder protection Local multi-user file & folder protection Remote file & folder protection Untrusted network admin Remote document policy enforcement 37
37 Section 4: User and Group Changes 38
38 Learning Objectives In this module you will learn: Add a new user More new groups available User Account Control to mitigates risk 39
39 New Users 40
40 New Groups 41
41 User Account Control User provides explicit consent before using elevated privilege. 42
42 User Account Control Setup 43
43 Changes to UAC in Windows 7 Four levels of notification for UAC in Windows 7: Most Secure Always Notify Me Displays all prompts Prompts dim screen Default for standard users Notify Me Only When Programs Try to Make Changes to My Computer (default) Display only prompts from applications Prompts dim screen Default for administrators Do not Dim Desktop Displays only prompts from applications No screen dimming Not default Least secure Never Notify Me Displays no prompts No screen dimming Not default 44
44 ACL 45
45 Section 5: Kernel Changes 46
46 Learning Objectives In this module you will learn: New security features via Windows 7 kernel improvement 47
47 Security Enhancements User Account Control level Virtual Accounts BitLocker and BitLocker-to-go 48
48 Virtual Accounts Want better isolation than existing service account Don t want to manage passwords Virtual accounts are like service accounts Process runs with virtual SID as principal System-managed password Show up as computer account when accessing network Services can specify a virtual account Account name must be NT SERVICE\<service> Service control manager verifies the service account and creates a user profile for the account 49
49 Section 6: Audit Changes 50
50 Learning Objective In this module you will learn: How Windows 7 has improved upon auditing capabilities. 51
51 Improved Auditing More Granularity Support for many auditing subcategories: Logon, logoff, file system access, registry access, use of administrative privilege Previous versions of Windows only support high-level categories such as System, Logon/Logoff, and Object Access, with little granularity New Logging Infrastructure Easier to filter out noise in logs and find the event you re looking for Tasks tied to events: When an event occurs, such as administrative privilege use, tasks such as sending an to an auditor can run automatically 52
52 Granular Audit Policy 53
53 Added Auditing For Registry value change audit events (old + new values) AD change audit events (old + new values) Improved operation-based audit Audit events for UAC Improved IPSec audit events including support for AuthIP RPC Call audit events Share Access audit events Share Management events Cryptographic function audit events IAS (RADIUS) audit events (server only) 54
54 Section 6: New and Changed Security Options 55
55 Learning Objectives In this module you will learn following features: Windows Biometric Framework AppLocker DirectAccess Windows Firewall Windows Security Essential Internet Explorer 8 56
56 AppLocker 58
57 DirectAccess 59
58 Windows 7 Firewall Both inbound and outbound Authentication and authorization aware Outbound applicationaware filtering is now possible Includes IPSec management Policy-based administration 60
59 Multiple Active Firewall Profiles New feature in Windows 7 Previously, Windows Firewall rules applied over all network connections (wired, wireless, VPN, hotspot, home, etc.) Now, can have different firewall rules for three classes of connections. Win7 Firewall Profile Domain Private Public Connection Most secure Least secure Firewall policies Least restrictive Most restrictive Example VPN Home wireless network All non-domain connections, by default 61
60 Microsoft Security Essentials Free anti-virus/spyware/malware tool from Microsoft designed for home PCs Not included in Windows 7 installation; needs to be downloaded separately from Microsoft No central management capabilities unlike Windows Defender not ideal solution for large organizations 62
61 Security Essentials Scanning Modes Real-Time Protection Warns users when potential spyware is executed or tries to perform certain operations 63
62 MS vs Other Brand Name Vendors
63
64 Security Essentials Scanning Modes Scheduled & On-Demand Scans Quick: scans only system files likely to be targeted by malware and viruses or likely culprits such as processes currently running and files currently open on the machine Full: scans all files, much longer process 66
65 Internet Explorer 8 Secure Features SmartScreen Domain Highlighting InPrivate Browsing Cross Site Scripting Filter 67
66 SmartScreen and SmartScreen Filter 68
67 SmartScreen Filter 69
68 Domain Highlighting The Microsoft domain is easy to read. 70
69 Cross Site Scripting Filtering Internet Explorer 8 detects potential cross-site scripting Vulnerabilities and disables harmful scripts. 71
70 InPrivate Browsing 72
71 Click-jacking prevention Data Execution Prevention (DEP) InPrivate Filtering Automatic crash recovery
72 Windows 7 Conclusion Many features already exist in other operating systems. Incorporates most major security changes introduced in Windows 7. UAC password requirements seen as less annoying in Windows 7 due to more customization and better software design. Improved security by additional features and options. 74
73 Questions? 75
74 References Windows 7: Evolved for the modern enterprise 7/default.aspx Understanding and Configuring User Account Control 76
75 References Windows 7 Windows 7 on Microsoft TechNet (for IT Pros) Windows 7 UAC Microsoft Security Essentials 77
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
More informationT21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates
T21: Microsoft Windows Server and Client Security Donald E. Hester, Maze Associates Microsoft Windows Server and Client Security Windows 7, Vista and Server 2008 R2 Donald E. Hester CISSP, CISA, CAP, MCT,
More informationWindows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
More informationWindows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
More information"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
More informationCourse Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
More informationINTRODUCTION TO WINDOWS 7
INTRODUCTION TO WINDOWS 7 Windows 7 Editions There are six different Windows 7 editions: Starter Home Basic Home Premium Professional Enterprise Ultimate Starter Windows 7 Starter edition does not support
More informationSecurity and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com
Security and Compliance Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com DISCLAIMER FOR DOCUMENTATION REGARDING PRE-RELEASED SOFTWARE This document supports a
More informationHow do I Check if My Computer is Compatible with Windows 7
How do I Check if My Computer is Compatible with Windows 7 Enterprise Computing & Service Management 1 Follow this link to download the Windows 7 Upgrade Advisor http://www.microsoft.com/windows/windows-7/get/upgrade-advisor.aspx
More informationSecurity Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation
Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified
More informationModule 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day
More informationICT Professional Optional Programmes
ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications
More informationUsrig Microsoft User Account Cards
usrig microsoft noows J. Peter Bruzzese Nick Saccomanno cue* 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents v Table of Contents 1 Navigating Your Windows 7 Environment 5 The Windows
More informationWindows" 7 Desktop Support
Windows" 7 Desktop Support and Administration Real World Skills for MCITP Certification and Beyond Darril Gibson WILEY Wiley Publishing, Inc. Contents Introduction xxiii Chapter 1 Planning for the Installation
More informationIntroduction to Windows 7 (Brought to you by RMRoberts.com)
Introduction to Windows 7 (Brought to you by RMRoberts.com) Note: Because of the number of screen captures needed to adequately explain this topic there have been some page breaks inserted to keep content
More information70-685: Enterprise Desktop Support Technician
70-685: Enterprise Desktop Support Technician Course Introduction Course Introduction Chapter 01 - Identifying Cause and Resolving Desktop Application Issues Identifying Cause and Resolving Desktop Application
More informationAdministering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led
Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer,
More informationMicrosoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.
Microsoft Windows 7 Administration Instant Reference William Panek WILEY Wiley Publishing, Inc. Introduction xix PART I: Installation 1 Chapter 1: Installing Windows 7 3 Understand Windows 7's New Features
More informationWindows 7, Enterprise Desktop Support Technician
Windows 7, Enterprise Desktop Support Technician Course Number: 70-685 Certification Exam This course is preparation for the Microsoft Certified IT Professional (MCITP) Exam, Exam 70-685: Pro: Windows
More informationConfiguring Windows Server 2008 Active Directory
Configuring Windows Server 2008 Active Directory Course Number: 70-680 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-680: TS: Windows 7, Configuring
More informationCourse Outline. ttttttt
1300 86 87246 1300 TO TRAIN 50292 - Administering and Maintaining General Description This five-day instructor-led course provides students with the knowledge and skills to successfully administer, maintain,
More informationConfiguring and Administering Windows 7
Configuring and Administering Windows 7 Length: 5 days Overview This five-day instructor-led course provides students with the knowledge and skills to configure and administer Microsoft Windows 7 as a
More informationMS 20687 Configuring Windows 8.1
P a g e 1 of 12 MS 20687 Configuring Windows 8.1 About this Course Get expert instruction and hands-on practice administering and configuring Windows 8.1 in this 5-day Microsoft Official Course. This course
More informationCourse 50322B: Configuring and Administering Windows 7
Course 50322B: Configuring and Administering Windows 7 Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course provides students with the knowledge
More informationObjectif. Participant. Prérequis. Remarque. Programme. Windows 7, Enterprise Desktop Support Technician (seven)
Objectif This five-day instructor-ledcourse provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help
More informationMS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.
MS-50292: Administering and Maintaining Windows 7 This five-day instructor-led course provides students with the knowledge and skills to successfully install, maintain, and troubleshoot Windows 7 computers.
More informationWindows Embedded 7 E versus Windows Embedded 7 P
Windows Embedded 7 E versus Windows Embedded 7 P Applications and Services Development.Net Framework.Net Framework 3.5 SP1.NET Framework 2.0 Client Profile.NET Framework 3.0.NET Framework 3.0 Client Profile.NET
More informationMS 50292: Administering and Maintaining Windows 7
MS 50292: Administering and Maintaining Windows 7 Description: This five-day instructor-led course provides students with the knowledge and skills to successfully administer, maintain, and troubleshoot
More informationPearl Echo Installation Checklist
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
More informationMS-50292 - MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp
MS-50292 - MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationWindows 7, Enterprise Desktop Support Technician
MS50331 Längd: 5 dagar Windows 7, Enterprise Desktop Support Technician Detta är den bredaste, mest djuplodande kursen för dig som arbetar som Supporttekniker och behöver vara champion på Windows när frågorna
More informationPractice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com)
Practice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com) 1. Which command is used to access the local group policy editor for Windows 7? A. poledit.exe B. gpedit.msc C. local.msc D. grplocal.exe
More informationILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
More informationTable of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11
2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information
More informationMCSA Windows 8 (Exam 70-687)
MCSA Windows 8 (Exam 70-687) Configuring Windows 8 Length: 5 Days Location: 182, Broadway, Newmarket, Auckland Vendor: Microsoft Audience(s): IT Professionals Level: 200 Technology: Windows 8 Type: Corporate
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Vendor: Microsoft Exam Code: 70-687 Exam Name: Microsoft Configuring Windows 8 Exam Version: Demo QUESTION: 1 A company has an Active Directory
More informationTable of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
More informationHP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
More information(Exam 70-680): Configuring
Microsoft MCTS Self-Paced Training Kit (Exam 70-680): Configuring Windows? Ian McLean Orin Thomas Contents Introduction Lab Setup Instructions Hardware Requirements Using the DVD xxv How to Install the
More informationWindows Vista (DARC) Matthew Cook http://escarpment.net/ http://darc-tech.org.uk/
Windows Vista (DARC) Matthew Cook http://escarpment.net/ http://darc-tech.org.uk/ 1 Introduction to Vista Five years worth of development Complex and big product Many versions Lots of under the hood changes
More informationCourse 6292A: Installing and Configuring Windows 7 Client. About this Course. Audience Profile
Course 6292A: Installing and Configuring Windows 7 Client Length: 3 Days Language(s): English Audience(s): IT Professionals Level: 200 Technology: Windows 7 Type: Course Delivery Method: Instructor-led
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
More informationWindows 7 Overview. M arkus Erlacher. Technical Solution Professional
Windows 7 Overview M arkus Erlacher Technical Solution Professional Microsoft Switzerland What Business Customers Told Us Voice of Cust omers Windows 7 Time is money. I just can t have a slow or unreliable
More informationSymantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
More informationInstalling and Configuring Windows 7 Client
Installing and Configuring Windows 7 Client Course 6292 - Three Days - Instructor-led - Hands on Introduction This three-day instructor-led course is intended for IT professionals who are interested in
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
More informationMS 20688 Managing and Maintaining Windows 8
P a g e 1 of 9 MS 20688 Managing and Maintaining Windows 8 About this Course In this course, students learn how to plan and implement the installation, management, and maintenance of Windows 8. Course
More informationSymantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
More informationUsing BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
More informationNavigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
More informationIT ESSENTIALS V4.1 WINDOWS 7 SUPPLEMENT
IT ESSENTIALS V4.1 WINDOWS 7 SUPPLEMENT Windows 7 content has been added to both exams required to achieve CompTIA A+ certification: CompTIA A+ Essentials (220-701) and CompTIA A+ Practical Application
More informationTable Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
More informationHP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7
HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7 September 15, 2009 Introduction HP is committed to supporting our customer s operating
More informationCourse 20688A: Managing and Maintaining Windows 8
Course 20688A: Managing and Maintaining Windows 8 Length: 5 Days Audience(s): IT Professionals Level: 200 Delivery Method: Instructor-led (classroom) About this Course In this course, students learn how
More informationDriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationTraining Guide: Configuring Windows8 8
Training Guide: Configuring Windows8 8 Scott D. Lowe Derek Schauland Rick W. Vanover Introduction System requirements Practice setup instructions Acknowledgments Errata & book support We want to hear from
More informationAdvanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
More informationContents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
More informationHow to Use Windows Firewall With User Account Control (UAC)
Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationIn this chapter you will find information on the following subjects:
17 1. From XP to Vista Microsoft, the creator of Windows, has published various versions of the Windows operating system over the past two decades. Windows Vista is the latest version, the successor to
More informationInstalling and Upgrading to Windows 7
Installing and Upgrading to Windows 7 Before you can install Windows 7 or upgrade to it, you first need to decide which version of 7 you will use. Then, you should check the computer s hardware to make
More informationTPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
More informationPlanning for Windows Server 2008 Servers
Planning for Windows Server 2008 Servers Course Number: 6430B Course Length: 3 Days Course Overview This 3-day course is intended for IT pros who are interested in the knowledge and skills necessary to
More informationSmart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
More informationHiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A
Exam A Microsoft_70-680_v2011-06-22_Kat QUESTION 1 You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the
More informationIntroducing Windows 8
Introducing Windows 8 Introduction Very Aggressive Change Building block for the future and future of devices Biggest Obstacle: Where is!?!? The New User Experience Start Screen Full screen Start Menu
More informationEncrypting a USB Drive Using TrueCrypt
Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and
More informationDriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
More informationDesigning and Deploying Connected Device Solutions for Small and Medium Business
Designing and Deploying Connected Device Solutions for Small and Medium Business HPATA Connected Devices Study Guide Rev 1.1 Table of Contents 1.1 Describe and recognize common desktop virtualization technologies
More informationTPM. (Trusted Platform Module) Installation Guide V2.1
TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing
More informationWindows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
More informationCisco IP Communicator (Softphone) Compatibility
Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator is Windows based and works on both XP and Vista The minimum PC requirements for use with Microsoft Windows XP are: Microsoft Windows
More informationElements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats. Windows XP Support Has Ended Why It Concerns You
Elements to a Secure Environment Becoming Resilient Towards Modern Cyberthreats Windows XP Support Has Ended Why It Concerns You Protect Detect Respond 1 02 Windows XP support has ended Windows XP support
More informationInstalling and Configuring Windows 10 20697-1B; 5 Days, Instructor-led
Installing and Configuring Windows 10 20697-1B; 5 Days, Instructor-led Course Description This course is designed to provide students with the knowledge and skills required to install and configure Windows
More informationGetting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers
Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec
More informationCS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
More informationHow to install EMIS Web on your home computer. Prerequisites
How to install EMIS Web on your home computer Prerequisites 1. Hardware The first thing to ensure is that you have appropriate hardware to run EMIS Web. The hardware requirements are laid out in document
More informationPrepared for: The American Association of State Highway and Transportation Officials. Julian Soh Microsoft Corporation. Julian.Soh@microsoft.
Prepared for: The American Association of State Highway and Transportation Officials Julian Soh Microsoft Corporation Julian.Soh@microsoft.com This is a directional view into Windows investments for businesses
More informationManaging the Windows 7 Desktop Environment
5 Chapter Managing the Windows 7 Desktop Environment INFORMATION IN THIS CHAPTER Local Management Tools Managing Hardware Devices and Drivers Managing Disks and File Systems Summary Windows 7 comes with
More informationObjectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall 2014. Lake
Objectives Windows 7 Security By Al Fall 2014 CS 140M LBCC Background Windows Security Architecture Windows Vulnerabilities Means of Evaluating Metrics System Hardening Windows Defenses OS Security Capabilities
More informationGetting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Symantec AntiVirus Corporate Edition Copyright 2004 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/04 10223881 Symantec and the Symantec logo are U.S. registered trademarks
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationKaspersky Endpoint Security 10 for Windows Administrator's Guide
Kaspersky Endpoint Security 10 for Windows Administrator's Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product! We hope that you will find this documentation
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationMicrosoft Windows 8 Beta Exam by Ding Dong
Microsoft Windows 8 Beta Exam by Ding Dong Number: 071-687 Passing Score: 700 Time Limit: 120 min File Version: 1.0.0 http://www.gratisexam.com/ Vertion 1.0.0 This is the Microsoft Windows 8 Beta Exam
More informationIntroduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com)
Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com) This practice examination consists of questions based on the most common Windows 7 features. As a professional,
More informationVirtualization and Windows 7
9 Chapter Virtualization and Windows 7 Information in this Chapter Windows XP Mode Many Forms of Virtualization Summary Windows Virtual PC is an optional component of Windows 7 Professional, Enterprise,
More informationDisk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
More informationStep-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
More informationGetting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
More informationICT Professional Competence Diploma PROCOM2
The programme leads to a Diploma in Professional Competence for ICT Professionals and on successful completion learners will have gained the following certification and qualifications: Microsoft Technology
More informationInstalling and Configuring Windows 7 Client
Installing and Configuring Windows 7 Client Perform a clean installation of Windows 7, upgrade to Windows 7, and migrate userrelated data and settings from an earlier version of Windows. Configure disks,
More informationWhitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationChapter 12: Windows XP, Vista, and 7
Chapter 12: Windows XP, Vista, and 7 Complete CompTIA A+ Guide to PCs, 6e To distinguish between the Windows XP, Vista, and 7 operating systems To install, configure, and troubleshoot Windows XP, Vista,
More informationLectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
More information2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
More informationInfineon TPM Professional Package
Chipcard & Security Release Notes (V4.3.000.3137 RTM) Infineon TPM Professional Package Version: 1.20 Date: 2012-08-28 Release Notes Page 1 of 16 Dev. / Step Code: Sales Code: Status: Date: 2012-08-28
More informationInstalling and Configuring Windows 10 20697-1; 5 Days; Instructor-led
Installing and Configuring Windows 10 20697-1; 5 Days; Instructor-led Course Description This course is designed to provide students with the knowledge and skills required to install and configure Windows
More information