1 / 24

CN1176 Computer Support

CN1176 Computer Support. Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS , MCDST, MCP, A+. Agenda. Chapter 7: Working with Applications Exercise / Lab Quiz. Configuring Internet Explorer 8. Compatibility view Change manually or via Group policy RSS feeds

zocha
Download Presentation

CN1176 Computer Support

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CN1176Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+

  2. Agenda • Chapter 7: Working with Applications • Exercise / Lab • Quiz

  3. Configuring Internet Explorer 8 • Compatibility view • Change manually or via Group policy • RSS feeds • Automatically retrieves new content from the content provider • Printing with IE

  4. Configuring Internet Explorer 8 • Managing add-ons • Separate software components • The four basic types of add-ons supported by IE are as follows: • Toolbars and Extensions • Search Providers • Accelerators • Enable users to send content to other resources, in the form of applications running on the computer or other sites on the Internet • InPrivate Filtering • Enables you to import and export XML files containing InPrivate filters

  5. Securing Internet Explorer • Protected Mode • Prevent attackers • Mandatory Integrity Control (MIC) assigns various integrity access levels to processes running on the computer • High (Admin), Medium (User), Low (Untrusted) • Only works with IE8 running on Vista or Windows 7, not XP

  6. Securing Internet Explorer (Cont.) • Security Zones • Internet • Default Zone for all sites • Run in protected mode and have minimal access • Local Intranet • Do not run in protected mode and have significant access • Trusted Sites • Most elevated set of privileges and is intended for sites that you can trust not to damage the computer • Restricted Sites • Most reduced set of privileges and runs in protected mode

  7. Securing Internet Explorer • SmartScreen Filter • Warn if there is phishing activity • InPrivateMode • InPrivateBrowsing • Prevents IE from maintaining a permanent record of the user’s activities during browsing session • InPrivateFiltering • Enables you to block content providers from gathering your information

  8. Securing Internet Explorer • Pop-Up Blocker • Privacy Settings • Use privacy settings to limit the ability of Web sites to create cookies • Browsing with Certificates • Secure Sockets Layer (SSL) with digital certificate

  9. Troubleshooting Program Compatibility • Program Compatibility Troubleshooter • a wizard-based solution • Tries to determine why an application is not running properly and gives you two options • Try Recommended Settings • Automatically configure and run the software with compatibility settings • Troubleshoot Program • A help wizard that lead you through series of questions

  10. Setting Compatibility Modes • Can set compatibility modes manually through the executable’s Properties sheet

  11. Configuring Application Compatibility Policies • To suppress the compatibility warnings • Limit users’ access to compatibility mode controls • Notify blocked drivers • Detect application installers that need to be run as administrator • Remove Program Compatibility Property Page

  12. Using the Application Compatibility Toolkit • A collection of programs to help you gather information and create solutions • Application Compatibility Manager • Compatibility Administrator • Internet Explorer Compatibility Test tool • Setup Analysis tool • Standard User Analyzer

  13. Application Compatibility Manager • Designed for large-scale Windows 7 deployments • Collect • To collect information from other computers on the network, you create data collection packages (DCPs) • Analyze • The analysis of the collected data begins with organization, which can include categorization, prioritization, application assessment, and assignment of deployment status • Test and Mitigate • Test applications and create mitigation strategies, using the Compatibility Administrator application

  14. Compatibility Administrator • A main area for solutions to known compatibility problems for hundreds of commercial Windows 7 applications

  15. Internet Explorer Compatibility Test Tool • Examines the compatibility of the web sites

  16. Setup Analysis Tool • Logging tool to analyze application setup programs for compatibility issues • Installation of 16-bit components • Installation of Graphical Identification and Authentication DLLs • Changes to files or registry keys that exist under Windows Resource Protection

  17. Standard User Analyzer • Examines applications for compatibility issues caused by the User Account Control (UAC) feature of Windows 7

  18. Using Windows XP Mode • Creates a virtual machine running Windows XP on your Windows 7 system • Used for applications that will not run any other way • Has extensive hardware requirements

  19. Configuring Application Restrictions • Restricting the applications that users can run on their computers • Two mechanisms for restricting application • Group Policy settings: software restriction policies • AppLocker

  20. Using Software Restriction Policies • Certificate rules • Based on the inclusion of a certificate signed by the software publisher • Hash rules • Based on a digital fingerprint that remains valid even when the name or location of the executable file changes • Network zone rules • Identify Windows Installer (.msi) packages downloaded with Internet Explorer based on the security zone of the site from which they are downloaded • Path rules • Identify applications by specifying a file or folder name or a registry key • Default rule • Applies when an application does not match any of the other rules

  21. Configuring Rule Settings • The three possible settings • Disallow • Basic User • Unrestricted • Resolving Conflicts • The more specific rule takes precedence over the less specific. • Hash rules • Certificate rules • Path rules • Zone rules

  22. Using AppLocker • Application Control Policies • New feature in Windows 7 Enterprise and Ultimate • Creation of rules is easier than Group Policy • Wizard-based • Only applies to Windows 7 and Windows Server 2008 R2

  23. Understanding Rule Types • Rule Types • Executable rules • Contains rules that apply to files with .exe and .com extensions • Windows Installer rules • Contains rules that apply to Windows Installer packages with .msi and .msp extensions • Script rules • Contains rules that apply to script files with .ps1, .bat, .cmd, .vbs, and .jsextensions • Criteria for resource access: • Publisher • Path • File Hash

  24. Assignment • Matching • Multiple Choice • Case Scenario 2

More Related