Windows 8

1. Windows 8 2. Module 1 - Installing and Deploying Windows 8. 3. Windows 8 editions. 4. Advantage of 64 bit Processor. 5. Minimum hardware requirement for Windows 8 6. Option for installing Windows 8 7. Installation of Windows 8 8. Upgrading and Migrating to Windows 8 9. What is Upgrading 10. What is Migration 11. Migrating User Data and Settings 12. Migrating using USMT ( User State Migration Tool ) 13. MBR - Master Boot Record 14. GUID - GPT Disk. 15. Disk Management tools. 16. Simple Volume 17. Spanned and Striped Volumes 18. Maintaining Disks, Partitions, and Volumes 19. Disk Quota 20. Device Driver in Windows 8 21. System Restore 22. LAST KNOWN GOOD CONFIGURATION 23. Configure and Trouble shoot Network Connections 24. What is an IPv4 Address 25. Default Gateway 26. Public and Private IPv4 Address 27. IPv6 Network Connectivity 28. IPv4 Address can be assigned by following types 29. Implementing Name Resolution 30. Trouble Shooting Network Connectivity 31. Implementing Wireless Security 32. Wireless network Technologies 33. What is Wireless Broadband? 34. IEEE 802.11 35. Wireless Network Configuration 36. Security Types 37. Implementing Network Security. 38. Configuring Windows Firewall 39. Ports and Application 40. Important Application, Protocol and Port Number 41. Configure Inbound and Outbound Rules 42. Securing Network traffic 43. Configuring Windows Defender 44. Managing File Access 45. NTFS Standard permission for FOLDER 46. Preventing Permission Inheritance 47. Different ways to Share Folder 48. RULE for setting NTFS + SHARE PERMISSION 49. Managing Printers 50. SkyDrive 51. Securing Windows 8 Desktop 52. User Account Types and Rights 53. Windows Authentication Methods 54. Important Security Features in Windows 8 55. Managing EFS Certificates 56. BitLocker 57. Configuring BitLocker To Go 58. UAC - User Account Control 59. Configuring Application. 60. Application Compatibility Issue 61. Resolve Common Application Compatibility Issues 62. Office 365 63. Windows Store 64. LOB (Line Of Business) and Sideloading 65. Configuring Internet Explorer Settings 66. AppLocker 67. Optimizing and Maintaining Windows 8 Client Computers 68. Performance Monitor 69. Commonly used Performance Counters 70. Resource Monitor 71. Managing Reliability of Windows 8 72. Managing Windows 8 Updates 73. Configuring Mobile Computing and Remote Access 74. Tools for Configuring Mobile Computers and Device Setting 75. Configure VPN Access 76. Data encryption 77. VPN Tunneling Protocols 78. Configure Remote Desktop and Remote Assistance 79. Remote Assistance 80. DirectAccess 81. Hyper-V 82. VHD 83. Managing Snapshot 84. Troubleshooting and Recovery Options for Windows 8 85. Enable and configure Windows 7 File Recovery 86. Advance Troubleshoot now option 87. Windows 8 System Restore 88. Using Windows PowerShell
Pr.Pg Next Pg

AppLocker tutorials

  • AppLocker is a security feature that specifies which applications are allowed to run by user.

  • Today organization faces number of challenges in controlling user rights in installing and executing applications. Unauthorised application can create security issues, virus and malware infection.

  • AppLocker feature applies to Windows 7 Ultimate and Enterprise, Windows 8 Enterprise, Windows Server 2008 R2 and Windows Server 2012.

  • In Windows 8 AppLocker feature apply only to Windows 8 Enterprise Edition. In Windows 8 Professional Version you can’t enforce the rules.

  • AppLocker is new feature that allows you to create rules to allow or deny applications from running based on unique identities of files. You can also specify which users or groups can run those applications.

  • It provides advance functionality of Software Restriction Policies.

  • AppLocker can help organization by way of

Reducing the possibility of Virus or Malware and information leaks from unauthorized software.

Limit the number and type of files that are allowed to run by preventing unlicensed or malicious software from running.

Ensuring that workstations are homogeneous across organization and reduces maintenance downtime.


Exercise AppLocker

  • Press Windows Key and R to Select Run or type gpedit.msc from start screen.

  • Expand Computer Configuration - then expand Windows Settings - then expand Security Settings, and then Application Control Policies.

  • From Application Control Policies node, and highlight AppLocker.

  • In AppLocker you can configure Executable Rules, Windows Installer Rules, Script Rules and Packaged App Rules. For example, highlight the Executable Rules node and right-click to select Create New Rule. You then can create a rule that allows or denies access to an executable, based on such criteria as the file path or publisher.

  • Many application created by software vendors do not require Administrator rights to install. As a result standard user can install many applications. With AppLocker, you can prevent users from installing and running per-user applications by creating a set of default AppLocker rules. The default rules also ensure that key operating system files are allowed to run for all users.

  • Remember before you create new rules manually or automatically generate rules for a specific folder, you must create the default AppLocker rules. Also remember that Without the default rules, critical system files might not run


To create Default rules enable the following

  • All users to run files in the default Program Files directory.

  • All users to run all files signed by the Windows operating system.

  • Members of the built-in Administrators group to run all files.


Steps to create the default AppLocker rules:

  • Continue from where you left earlier or you can

  • Directly open the Local Security Policy MMC snap-in, run secpol.msc.

  • In the console tree, double-click Application Control Policies, and then double-click AppLocker.

  • Right-click Executable Rules, and then click Create Default Rules.

  • By creating these rules, you also have automatically prevented all non-administrator users from being able to run programs that are installed in their user profile directory. You can recreate the rules at any time.

  • Note:- If you forget to create Default rule, you are blocked from performing administrative task. In such situation you need to restart computer in Safe mode, then add default rules, delete any deny rule that restrict access and then restart computer again.

  • On the Start screen, type gpedit.msc, and then press Enter.

  • In the Local Group Policy Editor, expand Computer Configuration, expand Windows Settings, and then expand Security Settings.

  • Expand Application Control Policies, and then double-click AppLocker.

  • Click Executable Rules, and then right-click and select Create New Rule.

  • Click Next.

  • On the Permissions screen, select Deny, and then click the Select… button.

  • In the Select User or Group dialog box, in the Enter the object names to select (examples) box, type click Check Names, and then click OK.

  • Click Next.

  • On the Conditions screen, select Path, and then click Next.

  • Click the Browse Files… button, and then in the File name box, type C:\Windows\Regedit.exe, and then click Open.

  • Click Next.

  • Click Next again, and then click Create.

  • Click Yes when prompted to create default rules.


Enforce AppLocker Rules

In the Local Group Policy Editor, click AppLocker, and then right-click and select Properties.

On the Enforcement tab, under Executable rules, click the Configured check box, and then select Enforce rules.

On the Enforcement tab, under Script rules, click the Configured check box, and then select Audit only.

Click OK.

Close the Local Group Policy Editor.


Pr.Pg border                                              Next Pg