Chapter 15. Security Essential. Understanding Security Threats. What’s New in Windows 7 Monitoring Your Computer’s Security Blocking Intruders with Windows Firewall. Staying Secure with Windows Update . Blocking Viruses and Worms with an Antivirus Program.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Among the key security improvements are these:
Figure 15-1 Clicking the notification area icon displays a menu that includes links to directly address current problems, as well as a link to open Action Center itself.
Figure 15-4 You can selectively disable and enable Action Center monitoring here, or you can manage monitored items individually by clicking links in the main Action Center window.
The firewall blocks all inbound traffic, with the exception of traffic sent in response to a request sent by your computer and unsolicited traffic that has been explicitly allowed by creating a rule.
Figure 15-5 Windows Firewall shows status and settings for each currently connected network. The Domain Networks profile appears only on computers that have been joined to a domain.
The Block All Incoming Connections check box in Customize Settings provides additional safety. When it’s selected, Windows Firewall rejects all unsolicited incoming traffic—even traffic from allowed programs or that would ordinarily be permitted by a rule.
For example, you might block all connections when you’re using a public wireless hotspot or when you know that your computer is actively under attack by others.
The simplest way to enable a connection is to click Allow A Program Or Feature Through Windows Firewall.
In addition to its real-time protection for spyware-like behavior, Windows Defender (shown in Figure 15-8) also scans your computer’s files periodically, looking for known spyware.
Figure 15-12 To perform an administrative task, a standard user must enter the password for an administrator account.
●Red background and red shield icon Identifies an application from a blocked publisher or one that is blocked by Group Policy. Be extremely wary if you see one of these.
●Yellow-orange background and red shield icon Identifies an application (signed or unsigned) that is not yet trusted by the local computer. (See Figure 15-13.)
●Blue-green background Identifies an administrative application that is part of Windows. (See Figures 15-11 and 15-12.)
●Gray background Identifies an application that is Authenticode signed and trusted by the local computer.