cn1176 computer support
DESCRIPTION
CN1176 Computer Support. Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS , MCDST, MCP, A+. Agenda. Chapter 7: Working with Applications Exercise / Lab Quiz. Configuring Internet Explorer 8. Compatibility view Change manually or via Group policy RSS feeds - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/1.jpg)
CN1176Computer SupportKemtis KunanuraksapongMSIS with DistinctionMCT, MCTS, MCDST, MCP, A+
![Page 2: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/2.jpg)
Agenda
•Chapter 7: Working with Applications•Exercise / Lab•Quiz
![Page 3: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/3.jpg)
Configuring Internet Explorer 8
•Compatibility view▫Change manually or via Group policy
•RSS feeds▫Automatically retrieves new content from
the content provider•Printing with IE
![Page 4: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/4.jpg)
Configuring Internet Explorer 8• Managing add-ons
▫Separate software components▫The four basic types of add-ons supported by IE
are as follows: Toolbars and Extensions Search Providers Accelerators
Enable users to send content to other resources, in the form of applications running on the computer or other sites on the Internet
InPrivate Filtering Enables you to import and export XML files containing
InPrivate filters
![Page 5: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/5.jpg)
Securing Internet Explorer
•Protected Mode▫Prevent attackers▫Mandatory Integrity Control (MIC) assigns
various integrity access levels to processes running on the computer High (Admin), Medium (User), Low
(Untrusted)▫Only works with IE8 running on Vista or
Windows 7, not XP
![Page 6: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/6.jpg)
Securing Internet Explorer (Cont.)• Security Zones
▫Internet Default Zone for all sites Run in protected mode and have minimal access
▫Local Intranet Do not run in protected mode and have significant
access▫Trusted Sites
Most elevated set of privileges and is intended for sites that you can trust not to damage the computer
▫Restricted Sites Most reduced set of privileges and runs in protected
mode
![Page 7: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/7.jpg)
Securing Internet Explorer
•SmartScreen Filter▫Warn if there is phishing activity
•InPrivate Mode▫InPrivate Browsing
Prevents IE from maintaining a permanent record of the user’s activities during browsing session
▫InPrivate Filtering Enables you to block content providers from
gathering your information
![Page 8: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/8.jpg)
Securing Internet Explorer
•Pop-Up Blocker•Privacy Settings
▫Use privacy settings to limit the ability of Web sites to create cookies
•Browsing with Certificates▫Secure Sockets Layer (SSL) with digital
certificate
![Page 9: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/9.jpg)
Troubleshooting Program Compatibility•Program Compatibility Troubleshooter
▫a wizard-based solution▫Tries to determine why an application is
not running properly and gives you two options Try Recommended Settings
Automatically configure and run the software with compatibility settings
Troubleshoot Program A help wizard that lead you through series of
questions
![Page 10: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/10.jpg)
Setting Compatibility Modes
•Can set compatibility modes manually through the executable’s Properties sheet
![Page 11: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/11.jpg)
Configuring Application Compatibility Policies•To suppress the compatibility warnings•Limit users’ access to compatibility mode
controls▫Notify blocked drivers▫Detect application installers that need to be
run as administrator▫Remove Program Compatibility Property
Page
![Page 12: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/12.jpg)
Using the Application Compatibility Toolkit•A collection of programs to help you
gather information and create solutions▫Application Compatibility Manager▫Compatibility Administrator▫Internet Explorer Compatibility Test tool▫Setup Analysis tool▫Standard User Analyzer
![Page 13: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/13.jpg)
Application Compatibility Manager• Designed for large-scale Windows 7 deployments• Collect
▫To collect information from other computers on the network, you create data collection packages (DCPs)
• Analyze▫The analysis of the collected data begins with
organization, which can include categorization, prioritization, application assessment, and assignment of deployment status
• Test and Mitigate▫Test applications and create mitigation strategies,
using the Compatibility Administrator application
![Page 14: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/14.jpg)
Compatibility Administrator
•A main area for solutions to known compatibility problems for hundreds of commercial Windows 7 applications
![Page 15: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/15.jpg)
Internet Explorer Compatibility Test Tool•Examines the compatibility of the web
sites
![Page 16: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/16.jpg)
Setup Analysis Tool
•Logging tool to analyze application setup programs for compatibility issues▫Installation of 16-bit components▫Installation of Graphical Identification and
Authentication DLLs▫Changes to files or registry keys that exist
under Windows Resource Protection
![Page 17: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/17.jpg)
Standard User Analyzer
•Examines applications for compatibility issues caused by the User Account Control (UAC) feature of Windows 7
![Page 18: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/18.jpg)
Using Windows XP Mode
•Creates a virtual machine running Windows XP on your Windows 7 system
•Used for applications that will not run any other way
•Has extensive hardware requirements
![Page 19: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/19.jpg)
Configuring Application Restrictions
•Restricting the applications that users can run on their computers
•Two mechanisms for restricting application▫Group Policy settings: software restriction
policies▫AppLocker
![Page 20: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/20.jpg)
Using Software Restriction Policies• Certificate rules
▫ Based on the inclusion of a certificate signed by the software publisher
• Hash rules▫ Based on a digital fingerprint that remains valid even when the
name or location of the executable file changes• Network zone rules
▫ Identify Windows Installer (.msi) packages downloaded with Internet Explorer based on the security zone of the site from which they are downloaded
• Path rules▫ Identify applications by specifying a file or folder name or a
registry key• Default rule
▫ Applies when an application does not match any of the other rules
![Page 21: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/21.jpg)
Configuring Rule Settings• The three possible settings
▫Disallow▫Basic User▫Unrestricted
• Resolving Conflicts▫The more specific rule takes precedence over
the less specific. Hash rules Certificate rules Path rules Zone rules
![Page 22: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/22.jpg)
Using AppLocker
•Application Control Policies•New feature in Windows 7 Enterprise and
Ultimate•Creation of rules is easier than Group
Policy▫Wizard-based
•Only applies to Windows 7 and Windows Server 2008 R2
![Page 23: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/23.jpg)
Understanding Rule Types• Rule Types
▫ Executable rules Contains rules that apply to files with .exe and .com
extensions▫ Windows Installer rules
Contains rules that apply to Windows Installer packages with .msi and .msp extensions
▫ Script rules Contains rules that apply to script files
with .ps1, .bat, .cmd, .vbs, and .js extensions• Criteria for resource access:
▫ Publisher▫ Path▫ File Hash
![Page 24: CN1176 Computer Support](https://reader035.vdocuments.site/reader035/viewer/2022070416/568151e8550346895dc0224e/html5/thumbnails/24.jpg)
Assignment
•Matching•Multiple Choice•Case Scenario 2