module 7 configuring network security

15
Module 7: Configuring Network Security

Upload: xeroxk

Post on 11-Jun-2015

92 views

Category:

Technology


1 download

TRANSCRIPT

  • 1. Module 7: ConfiguringNetwork Security

2. OverviewConfigure Windows Defender in Windows 7Configure Microsoft Security EssentialsConfigure Windows Firewall Settings 3. Lesson 1: Configuring Windows Defender inWindows 7What Is Windows Defender in Windows 7?Tools and Settings for Windows DefenderUsing Windows Vista to configure Windows DefenderGuidelines for configuring Windows Defender 4. What Is Windows Defender in Windows 7?Real-time scanningAutomated scanning and removalReal-time scanningAutomated scanning and removal 5. Tools and Settings for Windows DefenderQuarantined ItemsRemove or restore software that Windows Defender has preventedfrom runningSoftware ExplorerView detailed information about software that is running on thecomputerAllowed ItemsView software that you have chosen not to monitor with WindowsDefenderWindows Defender WebsiteGet more tools and the latest security information onlineMicrosoft SpynetJoin online community of users reporting how they deal withunclassified software 6. Demonstration: Using Windows 7 to ConfigureWindows DefenderIn this demonstration, you will see how toconfigure Windows Defender Tools andSettings 7. Guidelines for Configuring Windows DefenderConfigure Automated Spyware Definition UpdatesConfigure a nightly full scan of your systemPlace suspect files into quarantine for further inspectionConfigure continuous real-time protectionJoin the Microsoft Spynet community 8. Lesson 2: Configuring Windows Firewall SettingsWhat is Windows FirewallWindows Firewall SettingsWindows Firewall with Advanced Security featureConfiguring inbound rulesConfiguring outbound rulesConfiguring computer connection security rules 9. What Is Windows Firewall? 10. Windows Firewall Settings 11. Windows Firewall with Advanced Security FeatureInbound RulesOutbound RulesConnection Security RulesMonitoring 12. Configuring Inbound RulesConnectionRequirementConnectionRequirementNetworkEnvironmentNetworkEnvironmentAllow or BlockAllow or Block ConnectingComputersConnectingComputersProgram orPortProgram orPort 13. Configuring Outbound RulesConnectionRequirementConnectionRequirementNetworkEnvironmentNetworkEnvironmentAllow or BlockAllow or Block ConnectingComputersConnectingComputersConnectionTypeConnectionType 14. Configuring Computer Connection Security RulesSecurityRequirementsSecurityRequirementsConnectionEndpointsConnectionEndpointsAuthenticationTypeAuthenticationTypeIncoming orOutgoingIncoming orOutgoingSecurity LevelSecurity LevelExemptionsExemptions 15. Lab: Configuring Network SecurityExercise 1: Configuring Windows DefenderExercise 2: Configuring Windows Firewall