Ch07 - while logging on. This can state anything you would...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CIS 104 Windows Operating System in Depth Chapter 7 Submitted by: Chapter Overview. What new things did you feel were most important in this chapter? The most important updates to the Windows operating system is the advanced security. Windows has always lacked in security and the ability to modify or apply it. Tools like User Account Control (UAC) and Windows defender allow users to keep their PC healthy and secure. I learned that you can apply a variety of different security policies that can allow or restrict access to websites, software, and encrypted files. What you learned: Problems you discovered or variations from instructions Activity 7-1 Implementing a Password Policy I learned how to turn on the password complexity policy which allows administrators to place certain password requirements on. I am glad to learn this as I have always wanted to know. Activity 7-2 Configuring a Logon Message I learned how to setup and apply a logon message for users to see
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: while logging on. This can state anything you would like and is most helpful to use for instructions or policies. Activity 7-3 Configuring a Software Restriction Policy I learned to restrict access to programs. This is unnecessary for an administrator but is very helpful for creating a “work related” activity policy at work! Activity 7-4 Using Security Templates I learned how to create, analyze, and apply a security template policy. This can be performed by the security configuration and analysis tool or secedit in the command prompt. Activity 7-5 Auditing File Access Activity 7-6 Disabling UAC (Yippee) Activity 7-7 Configuring the Phishing Filter Activity 7-8 Using Windows Defender Activity 7-9 Using EFS Activity 7-10 Recovering Lost Encryption Keys What you learned: Problems you discovered or variations from instructions Activity 7-11 Protecting your Computer by using Windows Update Activity 7-12 Using Windows Security Center...
View Full Document

This note was uploaded on 06/05/2010 for the course CIS 105 taught by Professor Dunn during the Spring '10 term at Skagit Valley College.

Page1 / 2

Ch07 - while logging on. This can state anything you would...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online