This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: while logging on. This can state anything you would like and is most helpful to use for instructions or policies. Activity 7-3 Configuring a Software Restriction Policy I learned to restrict access to programs. This is unnecessary for an administrator but is very helpful for creating a “work related” activity policy at work! Activity 7-4 Using Security Templates I learned how to create, analyze, and apply a security template policy. This can be performed by the security configuration and analysis tool or secedit in the command prompt. Activity 7-5 Auditing File Access Activity 7-6 Disabling UAC (Yippee) Activity 7-7 Configuring the Phishing Filter Activity 7-8 Using Windows Defender Activity 7-9 Using EFS Activity 7-10 Recovering Lost Encryption Keys What you learned: Problems you discovered or variations from instructions Activity 7-11 Protecting your Computer by using Windows Update Activity 7-12 Using Windows Security Center...
View Full Document
This note was uploaded on 06/05/2010 for the course CIS 105 taught by Professor Dunn during the Spring '10 term at Skagit Valley College.
- Spring '10