Microsoft Official Course Module 9 Configuring Applications.

  • Published on
    24-Dec-2015

  • View
    214

  • Download
    1

Transcript

Slide 1 Microsoft Official Course Module 9 Configuring Applications Slide 2 Module Overview Install and Configure Applications Managing Apps from the Windows Store Configuring Internet Explorer Settings Configuring Application Restrictions in the Enterprise Slide 3 Lesson 1: Install and Configure Applications Installing Applications in Windows 8 Configuring Default Program Settings Application Compatibility Issues Resolving Common Application-Compatibility Issues Discussion: When to Use Office 365 Slide 4 Installing Applications in Windows 8 Slide 5 Configuring Default Program Settings You can configure Default Program behavior by selecting Control Panel > Programs > Default Programs Slide 6 Application Compatibility Issues Common application compatibility problems may relate to the following areas: Setup and installation of applications User Account Control Windows Resource Protection Internet Explorer Protected Mode 64-bit architecture Windows Filtering Platform Operating system version changes Kernel-mode drivers Slide 7 Resolving Common Application-Compatibility Issues Common mitigation methods include: Modifying the application configuration Applying updates or service packs Upgrading the application Modifying the security configuration Running the application in a virtualized environment Using application compatibility features built into the operating system Selecting another application Apply a shim Slide 8 Discussion: When to Use Office 365 When would you consider implementing Office 365? Slide 9 Lesson 2: Managing Apps from the Windows Store What Is the Windows Store? Managing Access to Windows Store What Is Sideloading? Slide 10 What Is the Windows Store? The Windows Store provides a convenient, single location for users to access and download apps Slide 11 Managing Access to Windows Store Use Group Policy to disable the Store application Slide 12 What Is Sideloading? Sideloading provides a mechanism for distribution of LOB apps to your client computers without using the Windows Store You must enable the sideloading facility by editing GPO settings Your LOB apps must be digitally signed You can use either dism.exe or Windows PowerShell to add, list, or remove LOB apps Slide 13 Lesson 3: Configuring Internet Explorer Settings What Is Compatibility View? Privacy Features The SmartScreen Feature Other Security Features Demonstration: How to Configure Internet Explorer Slide 14 What Is Compatibility View? None of the improvements in Internet Explorer 10 matter if websites look bad or work poorly Compatibility View helps display a webpage as it is meant to be viewed Slide 15 Privacy Features InPrivate Browsing is inherently more secure than using Delete Browsing History to maintain privacy because there are no logs kept or tracks made during browsing Tracking Protection helps monitor the frequency of all third-party content as it appears across all web sites visited by the user Delete Browsing History enables users and organizations to selectively delete browsing history Slide 16 The SmartScreen Feature Slide 17 Other Security Features Per-user ActiveX makes it possible for standard users to install ActiveX controls in their own user profile, without requiring administrative privileges Per-site ActiveX enables IT professionals to use Group Policy to preset allowed controls and their related domains XSS Filter identifies and neutralizes a cross-site scripting attack if it is replayed in the servers response DEP/NX protection helps thwart attacks by preventing code from running in memory that is marked nonexecutable Slide 18 Slide 19 Demonstration: How to Configure Internet Explorer In this demonstration, you will see how to: Enable Compatibility View for all websites Delete browsing history Configure InPrivate browsing View add-on management interface Manage downloads with the download manager Slide 20 Slide 21 Slide 22 Lab A: Configuring Internet Explorer Security Exercise 1: Configuring Windows Internet Explorer Logon Information Virtual Machines20687B-LON-DC1 20687B-LON-CL1 User NameAdatum\Administrator PasswordPa$$w0rd Estimated Time: 15 minutes Slide 23 Lab Scenario Holly Dickson is concerned about her users security settings when they are browsing the Internet, especially if they are browsing the Internet while connected to their customers networks. She has asked that you investigate improving the security settings on her users computers in Internet Explorer. Slide 24 Lab Review In the lab, you added the local intranet home page to the Trusted sites. How else could you have ensured that the required ActiveX controls did run? Slide 25 Lesson 4: Configuring Application Restrictions in the Enterprise What Is AppLocker? AppLocker Rules Demonstration: How to Configure AppLocker Rules Demonstration: How to Enforce AppLocker Rules Slide 26 What Is AppLocker? Benefits of AppLocker Controls how users can access and run all types of applications Ensures that user desktops are running only approved, licensed software AppLocker is a security feature that enables you to specify exactly what applications are allowed to run on user desktops Slide 27 AppLocker Rules Default rules enable the following: All users to run files in the default Program Files directory All users to run all files signed by the Windows operating system Members of the built-in Administrators group to run all files Create default AppLocker rules first, before manually creating new rules or automatically generating rules for a specific folder Create custom rules and automatically generate rules using an AppLocker wizard found in the Local Security Policy Console Slide 28 Demonstration: How to Configure AppLocker Rules In this demonstration, you will see how to: Create new executable rule Automatically generate Script rules Slide 29 Slide 30 Demonstration: How to Enforce AppLocker Rules In this demonstration, you will see how to: Enforce AppLocker Rules Confirm the executable rule enforcement Confirm the Script rule enforcement Slide 31 Slide 32 Slide 33 Lab B: Configuring AppLocker Exercise 1: Configuring AppLocker Rules Exercise 2: Testing the AppLocker Rules Logon Information Virtual Machines20687B-LON-DC1 20687B-LON-CL1 User NameAdatum\Administrator PasswordPa$$w0rd Estimated Time: 20 minutes Slide 34 Lab Scenario Holly is concerned that people in her department are spending time listening to music files. She wants a way to disable the Windows Media Player from running. You decide to implement AppLocker to prevent members of the IT group from running this program. Slide 35 Lab Review In the lab, you configured an executable path for the executable rule. What could you do if you wanted to allow users to run an earlier version of Windows Media Player? Slide 36 Module Review and Takeaways Review Questions Tools Best Practice Slide 37