Windows 8

1. Windows 8 2. Module 1 - Installing and Deploying Windows 8. 3. Windows 8 editions. 4. Advantage of 64 bit Processor. 5. Minimum hardware requirement for Windows 8 6. Option for installing Windows 8 7. Installation of Windows 8 8. Upgrading and Migrating to Windows 8 9. What is Upgrading 10. What is Migration 11. Migrating User Data and Settings 12. Migrating using USMT ( User State Migration Tool ) 13. MBR - Master Boot Record 14. GUID - GPT Disk. 15. Disk Management tools. 16. Simple Volume 17. Spanned and Striped Volumes 18. Maintaining Disks, Partitions, and Volumes 19. Disk Quota 20. Device Driver in Windows 8 21. System Restore 22. LAST KNOWN GOOD CONFIGURATION 23. Configure and Trouble shoot Network Connections 24. What is an IPv4 Address 25. Default Gateway 26. Public and Private IPv4 Address 27. IPv6 Network Connectivity 28. IPv4 Address can be assigned by following types 29. Implementing Name Resolution 30. Trouble Shooting Network Connectivity 31. Implementing Wireless Security 32. Wireless network Technologies 33. What is Wireless Broadband? 34. IEEE 802.11 35. Wireless Network Configuration 36. Security Types 37. Implementing Network Security. 38. Configuring Windows Firewall 39. Ports and Application 40. Important Application, Protocol and Port Number 41. Configure Inbound and Outbound Rules 42. Securing Network traffic 43. Configuring Windows Defender 44. Managing File Access 45. NTFS Standard permission for FOLDER 46. Preventing Permission Inheritance 47. Different ways to Share Folder 48. RULE for setting NTFS + SHARE PERMISSION 49. Managing Printers 50. SkyDrive 51. Securing Windows 8 Desktop 52. User Account Types and Rights 53. Windows Authentication Methods 54. Important Security Features in Windows 8 55. Managing EFS Certificates 56. BitLocker 57. Configuring BitLocker To Go 58. UAC - User Account Control 59. Configuring Application. 60. Application Compatibility Issue 61. Resolve Common Application Compatibility Issues 62. Office 365 63. Windows Store 64. LOB (Line Of Business) and Sideloading 65. Configuring Internet Explorer Settings 66. AppLocker 67. Optimizing and Maintaining Windows 8 Client Computers 68. Performance Monitor 69. Commonly used Performance Counters 70. Resource Monitor 71. Managing Reliability of Windows 8 72. Managing Windows 8 Updates 73. Configuring Mobile Computing and Remote Access 74. Tools for Configuring Mobile Computers and Device Setting 75. Configure VPN Access 76. Data encryption 77. VPN Tunneling Protocols 78. Configure Remote Desktop and Remote Assistance 79. Remote Assistance 80. DirectAccess 81. Hyper-V 82. VHD 83. Managing Snapshot 84. Troubleshooting and Recovery Options for Windows 8 85. Enable and configure Windows 7 File Recovery 86. Advance Troubleshoot now option 87. Windows 8 System Restore 88. Using Windows PowerShell
Pr.Pg Next Pg

Configuring Windows Firewall tutorials

  • Firewall isnít same as antivirus or anti-malware software.

  • Firewall is software or hardware that helps to prevent hacker from getting into your computer through network.

  • You will need separate Antivirus software to protect against Viruses and Anti-malware software to protect against malware.

  • Windows has inbuilt Firewall software, that helps to protect your computer from outside.

  • Firewall blocks all inbound connection except those that are specifically allowed by Firewall.

 

  • First time when you connect computer to network, you must select a network location.

  • According to network location, Windows 8 will set appropriate firewall and security settings.

  • There are three type of network location.

  • Domain Networks - when Domain controller exist, this option allows you to attach to Domain. Network Discovery is on by default for this mode.

  • Private Networks - Network at Office and Home. You know and trust people and computer on network. This network belongs to HomeGroup. And when you select this mode, Network Discovery is turned On.

  • Guest or Public Network. When you select this mode, Network Discovery is turned Off and no visibility of your computer to others. HomeGroup is not available.

  • You can modify the firewall setting of network location from

  • Xxxx - Windows Firewall -

  • Click Turn Windows Firewall On or Off

  • Select the network location and then make your selection

  • You can modify following options

  • Block all incoming connections, including those in the list of allowed program.

  • Notify me when Windows Firewall blocks a new Program.

  • You can customize four settings for each type of network (Public, Private, or Domain). To find these settings, follow these steps:

  • Open Windows Firewall by swiping in from the right edge of the screen, tapping Search (or if you're using a mouse, pointing to the upper-right corner of the screen, moving the mouse pointer down, and then clicking Search), enter firewall in the search box, tapping or clicking Settings, and then tapping or clicking Windows Firewall.

  • In the left pane, tap or click Turn Windows Firewall on or off. You might be asked for an admin password or to confirm your choice.

  • Once done you can do as follows.

  • Turn on Windows Firewall. This setting is selected by default. When Windows Firewall is on, most apps are blocked from receiving info through the firewall. If you want to allow an app to receive info, follow the steps below to add it to the list of allowed apps. For example, you might not be able to receive photos in an instant message until you add the instant messaging app to the list of allowed apps.

  • Block all incoming connections, including those in the list of allowed apps. This setting blocks all unsolicited attempts to connect to your PC. Use this setting when you need maximum protection for your PC when you connect to a public network in a Coffee house, Library, hotel or airport. (Blocking happens automatically when you choose the "No, don't turn on sharing or connect to devices" setting for a network). When you block all incoming connections, you can still view most webpages, send and receive email, and send and receive instant messages.

  • Notify me when Windows Firewall blocks a new app. If you select this check box, Windows Firewall will inform you when it blocks a new app and give you the option of unblocking that app.

  • Turn off Windows Firewall (not recommended). Avoid using this setting unless you have another firewall app running on your PC.

 

Firewall Exceptions

  • It is generally safer to add a program to the list of allowed programs than to open a port.

  • If you open a port, you unlock that port, it stays open until you close it whether a program is using it or not.

  • If you add a program to the list of allowed programs, you are unlocking the port but not opening it. The port is open only for communication when a program or the computer requires it.

  • To decrease security risks perform following steps.

  • Allow only program or Port when it is must.

  • Remove Programs from allowed Program list and Close all ports when you donít need them.

  • Finally never allow unknown program to communicate through the Firewall.

 

Windows Firewall Notification

  • If you want to display firewall notification in the taskbar,

  • Click Control Panel

  • Click on System and Security

  • Click on Windows Firewall

  • From the left panel click on Change Notification Settings

  • On each network Location (Private, Public and Domain)

  • Check Ģ Notify me when Windows Firewall Block a new app

 

Windows Firewall with Advanced Security Setting

  • Click Control Panel

  • Click on System and Security

  • Click on Windows Firewall

  • Click on Advance Settings

  • or

  • Select Start Screen and type wf.msc and press enter.

  • This will give you Windows Firewall with Advance Security.

  • Now click on Windows Firewall Properties.

  • This will show Domain Profile, Private Profile, Public Profile and IPsec Settings.

  • On Domain, Private and Public profile it will give following options.

  • Firewall State - by default it will be On (Recommended), you can turn It Off.

  • Inbound connections - it gives options to control incoming traffic such as

  • Block (default) - this will block traffic for selected connection.

  • Block all connection. This will block traffic for all connection.

  • Allow - this will allow traffic for selected connection.

  • Outbound connection - it gives options to control outgoing traffic such as

  • Allow (default) - this will allow traffic for selected connection.

  • Block - this will block traffic for selected connection.

  • Protected network Connection - Click on Customize button. If you have more than one network adapter, you can select Ģ for each connection you want Windows Firewall to help protect.

  • Settings - Click on Customise button and this will give you customise settings as follow.

  • Display a notification. When Yes it will display notification to user when a program is blocked from receiving inbound connection. When no, it wonít display notification

  • Allow Unicast response - By default Yes. When Yes, it will respond to multicast or broadcast network traffic. When you turn it No, it will not respond to other multicast and broadcast. However it wonít affect DHCP (Dynamic Host Configuration Protocol) broadcast but it will affect other protocol broadcast such as NetBIOS, SSDP and WSDAPI.

  • Logging:- Click on Customize to configure

  • Name:- You can specify Firewall Profile Log file name and path. Default log file path is %systemroot%\System32\logfiles\firewall\pfirewall.log

  • Size Limit (KB):- By default log file size if 4096 KB. You can adjust file size.

  • Log Drop Packets : By default No. if you choose Yes, then only it will log it.

  • Log successful connections: By default No. if you choose Yes, then only it will log it.

  • Windows Firewall with Advance security Rules

  • Rules are collection of conditions that define which traffic will be allowed, Blocked or secured with firewall.

 

There are three types of rules.

  1. Inbound Rules.

  2. Outbound Rules.

  3. Connection Security Rules.

 

Inbound Rules

  • As name suggest Inbound Rules explicitly allows or block traffic that match ruleís condition.

  • When you install Windows, Windows Firewall blocks all unsolicited inbound traffic. To allow unsolicited inbound traffic you have to create inbound rule.

 

Outbound Rules

  • Windows Firewall allows all outbound traffic. Outbound rules explicitly allow or deny traffic originated from current computer.

  • Because outbound traffic is allowed by default, you typically use outbound rules to block network traffic that you do not want.

  • There are four different types of Inbound and outbound rules.

Program rules -

  • This rule control traffic for a program

  • This rule is useful when you are not sure about the port number or other settings required.

  • You have to specify The Program path that is executable .exe file location,

Port Rule

  • This rule allows connection based on TCP or UDP port number over which computer is trying to connect.

  • You can specify selected port or port numbers in range,

Predefined Rules

  • Windows 8 gives bunch of predefined Rules such as BranchCache Content Retrieval, Core networking, Remote Desktop, Windows Remote Management and so on.

Custom Rules

  • You can specify custom rule for connection based on condition that other types of firewall rules do not cover.

  • You need to specify Program name, Protocol Type, Port number, Local and Remote port, Local and Remote IP Address and so on.

  • Specify action whether to allow it, allow if connection is secure or block it.

  • Specify Profile Domain, Private or Public where rule apply.

  • Finally give name to rule.

 

Connection Security rules

  • Connection security rules involve the authentication of two computers before they begin communications and the securing of information sent between two computers.

  • Connection Security Rules uses IPsec (Internet Protocol security) to secure traffic while it crosses the network.

  • IPsec achieve connection security by using key exchange, authentication, data integrity and data encryption.

  • Connection security rules are discussed in detail in later part of this video.

 

Pr.Pg border                                              Next Pg