cn1176 computer support

24
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+

Upload: zocha

Post on 23-Jan-2016

15 views

Category:

Documents


0 download

DESCRIPTION

CN1176 Computer Support. Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS , MCDST, MCP, A+. Agenda. Chapter 7: Working with Applications Exercise / Lab Quiz. Configuring Internet Explorer 8. Compatibility view Change manually or via Group policy RSS feeds - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: CN1176 Computer Support

CN1176Computer SupportKemtis KunanuraksapongMSIS with DistinctionMCT, MCTS, MCDST, MCP, A+

Page 2: CN1176 Computer Support

Agenda

•Chapter 7: Working with Applications•Exercise / Lab•Quiz

Page 3: CN1176 Computer Support

Configuring Internet Explorer 8

•Compatibility view▫Change manually or via Group policy

•RSS feeds▫Automatically retrieves new content from

the content provider•Printing with IE

Page 4: CN1176 Computer Support

Configuring Internet Explorer 8• Managing add-ons

▫Separate software components▫The four basic types of add-ons supported by IE

are as follows: Toolbars and Extensions Search Providers Accelerators

Enable users to send content to other resources, in the form of applications running on the computer or other sites on the Internet

InPrivate Filtering Enables you to import and export XML files containing

InPrivate filters

Page 5: CN1176 Computer Support

Securing Internet Explorer

•Protected Mode▫Prevent attackers▫Mandatory Integrity Control (MIC) assigns

various integrity access levels to processes running on the computer High (Admin), Medium (User), Low

(Untrusted)▫Only works with IE8 running on Vista or

Windows 7, not XP

Page 6: CN1176 Computer Support

Securing Internet Explorer (Cont.)• Security Zones

▫Internet Default Zone for all sites Run in protected mode and have minimal access

▫Local Intranet Do not run in protected mode and have significant

access▫Trusted Sites

Most elevated set of privileges and is intended for sites that you can trust not to damage the computer

▫Restricted Sites Most reduced set of privileges and runs in protected

mode

Page 7: CN1176 Computer Support

Securing Internet Explorer

•SmartScreen Filter▫Warn if there is phishing activity

•InPrivate Mode▫InPrivate Browsing

Prevents IE from maintaining a permanent record of the user’s activities during browsing session

▫InPrivate Filtering Enables you to block content providers from

gathering your information

Page 8: CN1176 Computer Support

Securing Internet Explorer

•Pop-Up Blocker•Privacy Settings

▫Use privacy settings to limit the ability of Web sites to create cookies

•Browsing with Certificates▫Secure Sockets Layer (SSL) with digital

certificate

Page 9: CN1176 Computer Support

Troubleshooting Program Compatibility•Program Compatibility Troubleshooter

▫a wizard-based solution▫Tries to determine why an application is

not running properly and gives you two options Try Recommended Settings

Automatically configure and run the software with compatibility settings

Troubleshoot Program A help wizard that lead you through series of

questions

Page 10: CN1176 Computer Support

Setting Compatibility Modes

•Can set compatibility modes manually through the executable’s Properties sheet

Page 11: CN1176 Computer Support

Configuring Application Compatibility Policies•To suppress the compatibility warnings•Limit users’ access to compatibility mode

controls▫Notify blocked drivers▫Detect application installers that need to be

run as administrator▫Remove Program Compatibility Property

Page

Page 12: CN1176 Computer Support

Using the Application Compatibility Toolkit•A collection of programs to help you

gather information and create solutions▫Application Compatibility Manager▫Compatibility Administrator▫Internet Explorer Compatibility Test tool▫Setup Analysis tool▫Standard User Analyzer

Page 13: CN1176 Computer Support

Application Compatibility Manager• Designed for large-scale Windows 7 deployments• Collect

▫To collect information from other computers on the network, you create data collection packages (DCPs)

• Analyze▫The analysis of the collected data begins with

organization, which can include categorization, prioritization, application assessment, and assignment of deployment status

• Test and Mitigate▫Test applications and create mitigation strategies,

using the Compatibility Administrator application

Page 14: CN1176 Computer Support

Compatibility Administrator

•A main area for solutions to known compatibility problems for hundreds of commercial Windows 7 applications

Page 15: CN1176 Computer Support

Internet Explorer Compatibility Test Tool•Examines the compatibility of the web

sites

Page 16: CN1176 Computer Support

Setup Analysis Tool

•Logging tool to analyze application setup programs for compatibility issues▫Installation of 16-bit components▫Installation of Graphical Identification and

Authentication DLLs▫Changes to files or registry keys that exist

under Windows Resource Protection

Page 17: CN1176 Computer Support

Standard User Analyzer

•Examines applications for compatibility issues caused by the User Account Control (UAC) feature of Windows 7

Page 18: CN1176 Computer Support

Using Windows XP Mode

•Creates a virtual machine running Windows XP on your Windows 7 system

•Used for applications that will not run any other way

•Has extensive hardware requirements

Page 19: CN1176 Computer Support

Configuring Application Restrictions

•Restricting the applications that users can run on their computers

•Two mechanisms for restricting application▫Group Policy settings: software restriction

policies▫AppLocker

Page 20: CN1176 Computer Support

Using Software Restriction Policies• Certificate rules

▫ Based on the inclusion of a certificate signed by the software publisher

• Hash rules▫ Based on a digital fingerprint that remains valid even when the

name or location of the executable file changes• Network zone rules

▫ Identify Windows Installer (.msi) packages downloaded with Internet Explorer based on the security zone of the site from which they are downloaded

• Path rules▫ Identify applications by specifying a file or folder name or a

registry key• Default rule

▫ Applies when an application does not match any of the other rules

Page 21: CN1176 Computer Support

Configuring Rule Settings• The three possible settings

▫Disallow▫Basic User▫Unrestricted

• Resolving Conflicts▫The more specific rule takes precedence over

the less specific. Hash rules Certificate rules Path rules Zone rules

Page 22: CN1176 Computer Support

Using AppLocker

•Application Control Policies•New feature in Windows 7 Enterprise and

Ultimate•Creation of rules is easier than Group

Policy▫Wizard-based

•Only applies to Windows 7 and Windows Server 2008 R2

Page 23: CN1176 Computer Support

Understanding Rule Types• Rule Types

▫ Executable rules Contains rules that apply to files with .exe and .com

extensions▫ Windows Installer rules

Contains rules that apply to Windows Installer packages with .msi and .msp extensions

▫ Script rules Contains rules that apply to script files

with .ps1, .bat, .cmd, .vbs, and .js extensions• Criteria for resource access:

▫ Publisher▫ Path▫ File Hash

Page 24: CN1176 Computer Support

Assignment

•Matching•Multiple Choice•Case Scenario 2