30
Microsoft ® Official Course Module 9 Configuring Applications

Microsoft ® Official Course Module 9 Configuring Applications

Embed Size (px)

Citation preview

Page 1: Microsoft ® Official Course Module 9 Configuring Applications

Microsoft® Official Course

Module 9

Configuring Applications

Page 2: Microsoft ® Official Course Module 9 Configuring Applications

Module Overview

Install and Configure Applications

Managing Apps from the Windows Store

Configuring Internet Explorer Settings•Configuring Application Restrictions in the Enterprise

Page 3: Microsoft ® Official Course Module 9 Configuring Applications

Lesson 1: Install and Configure Applications

Installing Applications in Windows 8

Configuring Default Program Settings

Application Compatibility Issues

Resolving Common Application-Compatibility Issues•Discussion: When to Use Office 365

Page 4: Microsoft ® Official Course Module 9 Configuring Applications

Installing Applications in Windows 8

Page 5: Microsoft ® Official Course Module 9 Configuring Applications

Configuring Default Program Settings

You can configure Default Program behavior by selecting Control Panel > Programs > Default Programs

Page 6: Microsoft ® Official Course Module 9 Configuring Applications

Application Compatibility Issues

Common application compatibility problems may relate to the following areas:• Setup and installation of applications• User Account Control• Windows Resource Protection• Internet Explorer Protected Mode• 64-bit architecture• Windows Filtering Platform • Operating system version changes• Kernel-mode drivers

Page 7: Microsoft ® Official Course Module 9 Configuring Applications

Resolving Common Application-Compatibility Issues

Common mitigation methods include:• Modifying the application configuration• Applying updates or service packs• Upgrading the application• Modifying the security configuration• Running the application in a virtualized

environment• Using application compatibility features built

into the operating system• Selecting another application• Apply a shim

Page 8: Microsoft ® Official Course Module 9 Configuring Applications

Discussion: When to Use Office 365

•When would you consider implementing Office 365?

Page 9: Microsoft ® Official Course Module 9 Configuring Applications

Lesson 2: Managing Apps from the Windows Store

What Is the Windows Store?

Managing Access to Windows Store•What Is Sideloading?

Page 10: Microsoft ® Official Course Module 9 Configuring Applications

What Is the Windows Store?

The Windows Store provides a convenient, single location for users to access and

download apps

Page 11: Microsoft ® Official Course Module 9 Configuring Applications

Managing Access to Windows Store

Use Group Policy to disable the Store application

Page 12: Microsoft ® Official Course Module 9 Configuring Applications

What Is Sideloading?

Sideloading provides a mechanism for distribution of LOB apps to your client computers without using the Windows Store

• You must enable the sideloading facility by editing GPO settings

• Your LOB apps must be digitally signed• You can use either dism.exe or Windows PowerShell to

add, list, or remove LOB apps

Page 13: Microsoft ® Official Course Module 9 Configuring Applications

Lesson 3: Configuring Internet Explorer Settings

What Is Compatibility View?

Privacy Features

The SmartScreen Feature

Other Security Features•Demonstration: How to Configure Internet Explorer

Page 14: Microsoft ® Official Course Module 9 Configuring Applications

What Is Compatibility View?

• None of the improvements in Internet Explorer 10 matter if websites look bad or work poorly

• Compatibility View helps display a webpage as it is meant to be viewed

Page 15: Microsoft ® Official Course Module 9 Configuring Applications

Privacy Features

• InPrivate Browsing is inherently more secure than using Delete Browsing History to maintain privacy because there are no logs kept or tracks made during browsing

• Tracking Protection helps monitor the frequency of all third-party content as it appears across all web sites visited by the user

• Delete Browsing History enables users and organizations to selectively delete browsing history

Page 16: Microsoft ® Official Course Module 9 Configuring Applications

The SmartScreen Feature

Page 17: Microsoft ® Official Course Module 9 Configuring Applications

Other Security Features

• Per-user ActiveX makes it possible for standard users to install ActiveX controls in their own user profile, without requiring administrative privileges

• Per-site ActiveX enables IT professionals to use Group Policy to preset allowed controls and their related domains

• XSS Filter identifies and neutralizes a cross-site scripting attack if it is replayed in the server’s response

• DEP/NX protection helps thwart attacks by preventing code from running in memory that is marked nonexecutable

Page 18: Microsoft ® Official Course Module 9 Configuring Applications

Demonstration: How to Configure Internet Explorer

In this demonstration, you will see how to:

• Enable Compatibility View for all websites

• Delete browsing history

• Configure InPrivate browsing

• View add-on management interface

• Manage downloads with the download manager

Page 19: Microsoft ® Official Course Module 9 Configuring Applications

Lab A: Configuring Internet Explorer Security

•Exercise 1: Configuring Windows Internet Explorer

Logon InformationVirtual Machines 20687B-LON-DC1

20687B-LON-CL1User Name Adatum\AdministratorPassword Pa$$w0rd

Estimated Time: 15 minutes

Page 20: Microsoft ® Official Course Module 9 Configuring Applications

Lab Scenario

Holly Dickson is concerned about her users’ security settings when they are browsing the Internet, especially if they are browsing the Internet while connected to their customer’s networks. She has asked that you investigate improving the security settings on her users’ computers in Internet Explorer.

Page 21: Microsoft ® Official Course Module 9 Configuring Applications

Lab Review

• In the lab, you added the local intranet home page to the Trusted sites. How else could you have ensured that the required ActiveX controls did run?

Page 22: Microsoft ® Official Course Module 9 Configuring Applications

Lesson 4: Configuring Application Restrictions in the Enterprise

What Is AppLocker?

AppLocker Rules

Demonstration: How to Configure AppLocker Rules•Demonstration: How to Enforce AppLocker Rules

Page 23: Microsoft ® Official Course Module 9 Configuring Applications

What Is AppLocker?

Benefits of AppLocker

• Controls how users can access and run all types of applications

• Ensures that user desktops are running only approved, licensed software

AppLocker is a security feature that enables you to specify exactly what applications are allowed to run on user desktops

Page 24: Microsoft ® Official Course Module 9 Configuring Applications

AppLocker Rules

Default rules enable the following:

• All users to run files in the default Program Files directory

• All users to run all files signed by the Windows operating system

• Members of the built-in Administrators group to run all files

Create default AppLocker rules first, before manually creating new rules or automatically generating rules for a specific folder

Create custom rules and automatically generate rules using an AppLocker wizard found in the Local Security Policy Console

Page 25: Microsoft ® Official Course Module 9 Configuring Applications

Demonstration: How to Configure AppLocker Rules

In this demonstration, you will see how to: • Create new executable rule• Automatically generate Script rules

Page 26: Microsoft ® Official Course Module 9 Configuring Applications

Demonstration: How to Enforce AppLocker Rules

In this demonstration, you will see how to: • Enforce AppLocker Rules• Confirm the executable rule enforcement• Confirm the Script rule enforcement

Page 27: Microsoft ® Official Course Module 9 Configuring Applications

Lab B: Configuring AppLocker

Exercise 1: Configuring AppLocker Rules•Exercise 2: Testing the AppLocker Rules

Logon InformationVirtual Machines 20687B-LON-DC1

20687B-LON-CL1User Name Adatum\AdministratorPassword Pa$$w0rd

Estimated Time: 20 minutes

Page 28: Microsoft ® Official Course Module 9 Configuring Applications

Lab Scenario

Holly is concerned that people in her department are spending time listening to music files. She wants a way to disable the Windows Media® Player from running. You decide to implement AppLocker® to prevent members of the IT group from running this program.

Page 29: Microsoft ® Official Course Module 9 Configuring Applications

Lab Review

• In the lab, you configured an executable path for the executable rule. What could you do if you wanted to allow users to run an earlier version of Windows Media Player?

Page 30: Microsoft ® Official Course Module 9 Configuring Applications

Module Review and Takeaways

Review Questions

Tools•Best Practice