+ All Categories
Home > Technology > Module 7 configuring network security

Module 7 configuring network security

Date post: 11-Jun-2015
Category:
Upload: xeroxk
View: 92 times
Download: 1 times
Share this document with a friend
Popular Tags:
15
Module 7: Configuring Network Security
Transcript
  • 1. Module 7: ConfiguringNetwork Security

2. OverviewConfigure Windows Defender in Windows 7Configure Microsoft Security EssentialsConfigure Windows Firewall Settings 3. Lesson 1: Configuring Windows Defender inWindows 7What Is Windows Defender in Windows 7?Tools and Settings for Windows DefenderUsing Windows Vista to configure Windows DefenderGuidelines for configuring Windows Defender 4. What Is Windows Defender in Windows 7?Real-time scanningAutomated scanning and removalReal-time scanningAutomated scanning and removal 5. Tools and Settings for Windows DefenderQuarantined ItemsRemove or restore software that Windows Defender has preventedfrom runningSoftware ExplorerView detailed information about software that is running on thecomputerAllowed ItemsView software that you have chosen not to monitor with WindowsDefenderWindows Defender WebsiteGet more tools and the latest security information onlineMicrosoft SpynetJoin online community of users reporting how they deal withunclassified software 6. Demonstration: Using Windows 7 to ConfigureWindows DefenderIn this demonstration, you will see how toconfigure Windows Defender Tools andSettings 7. Guidelines for Configuring Windows DefenderConfigure Automated Spyware Definition UpdatesConfigure a nightly full scan of your systemPlace suspect files into quarantine for further inspectionConfigure continuous real-time protectionJoin the Microsoft Spynet community 8. Lesson 2: Configuring Windows Firewall SettingsWhat is Windows FirewallWindows Firewall SettingsWindows Firewall with Advanced Security featureConfiguring inbound rulesConfiguring outbound rulesConfiguring computer connection security rules 9. What Is Windows Firewall? 10. Windows Firewall Settings 11. Windows Firewall with Advanced Security FeatureInbound RulesOutbound RulesConnection Security RulesMonitoring 12. Configuring Inbound RulesConnectionRequirementConnectionRequirementNetworkEnvironmentNetworkEnvironmentAllow or BlockAllow or Block ConnectingComputersConnectingComputersProgram orPortProgram orPort 13. Configuring Outbound RulesConnectionRequirementConnectionRequirementNetworkEnvironmentNetworkEnvironmentAllow or BlockAllow or Block ConnectingComputersConnectingComputersConnectionTypeConnectionType 14. Configuring Computer Connection Security RulesSecurityRequirementsSecurityRequirementsConnectionEndpointsConnectionEndpointsAuthenticationTypeAuthenticationTypeIncoming orOutgoingIncoming orOutgoingSecurity LevelSecurity LevelExemptionsExemptions 15. Lab: Configuring Network SecurityExercise 1: Configuring Windows DefenderExercise 2: Configuring Windows Firewall


Recommended