Windows 8

1. Windows 8 2. Module 1 - Installing and Deploying Windows 8. 3. Windows 8 editions. 4. Advantage of 64 bit Processor. 5. Minimum hardware requirement for Windows 8 6. Option for installing Windows 8 7. Installation of Windows 8 8. Upgrading and Migrating to Windows 8 9. What is Upgrading 10. What is Migration 11. Migrating User Data and Settings 12. Migrating using USMT ( User State Migration Tool ) 13. MBR - Master Boot Record 14. GUID - GPT Disk. 15. Disk Management tools. 16. Simple Volume 17. Spanned and Striped Volumes 18. Maintaining Disks, Partitions, and Volumes 19. Disk Quota 20. Device Driver in Windows 8 21. System Restore 22. LAST KNOWN GOOD CONFIGURATION 23. Configure and Trouble shoot Network Connections 24. What is an IPv4 Address 25. Default Gateway 26. Public and Private IPv4 Address 27. IPv6 Network Connectivity 28. IPv4 Address can be assigned by following types 29. Implementing Name Resolution 30. Trouble Shooting Network Connectivity 31. Implementing Wireless Security 32. Wireless network Technologies 33. What is Wireless Broadband? 34. IEEE 802.11 35. Wireless Network Configuration 36. Security Types 37. Implementing Network Security. 38. Configuring Windows Firewall 39. Ports and Application 40. Important Application, Protocol and Port Number 41. Configure Inbound and Outbound Rules 42. Securing Network traffic 43. Configuring Windows Defender 44. Managing File Access 45. NTFS Standard permission for FOLDER 46. Preventing Permission Inheritance 47. Different ways to Share Folder 48. RULE for setting NTFS + SHARE PERMISSION 49. Managing Printers 50. SkyDrive 51. Securing Windows 8 Desktop 52. User Account Types and Rights 53. Windows Authentication Methods 54. Important Security Features in Windows 8 55. Managing EFS Certificates 56. BitLocker 57. Configuring BitLocker To Go 58. UAC - User Account Control 59. Configuring Application. 60. Application Compatibility Issue 61. Resolve Common Application Compatibility Issues 62. Office 365 63. Windows Store 64. LOB (Line Of Business) and Sideloading 65. Configuring Internet Explorer Settings 66. AppLocker 67. Optimizing and Maintaining Windows 8 Client Computers 68. Performance Monitor 69. Commonly used Performance Counters 70. Resource Monitor 71. Managing Reliability of Windows 8 72. Managing Windows 8 Updates 73. Configuring Mobile Computing and Remote Access 74. Tools for Configuring Mobile Computers and Device Setting 75. Configure VPN Access 76. Data encryption 77. VPN Tunneling Protocols 78. Configure Remote Desktop and Remote Assistance 79. Remote Assistance 80. DirectAccess 81. Hyper-V 82. VHD 83. Managing Snapshot 84. Troubleshooting and Recovery Options for Windows 8 85. Enable and configure Windows 7 File Recovery 86. Advance Troubleshoot now option 87. Windows 8 System Restore 88. Using Windows PowerShell
Pr.Pg Next Pg

Important Security Features in Windows 8 tutorials

  • Windows 8 provide robust and secure platform with help of following tools.

  • EFS - Encrypting File System.

  • Windows BitLocker and BitLocker To Go.

  • Windows AppLocker

  • UAC - User Account Control

  • Windows Firewall with Advanced Security.

  • Windows Defender.

 

Securing Data with EFS and BitLocker

  • Notebook, Laptop can be lost or stolen at the same time Desktop hard disk can be stolen. In all cases it poses a risk to confidential Data.

  • Stolen or lost computers and data are vulnerable to unauthorized access, same way hard disk data can be transferred using different computer.

  • You can use EFS policy to implement a secure environment.

  • BitLocker protects against data theft or exposure of data on lost or stolen hard disk.

 

EFS - Encrypting File System

  • EFS is built-in file encryption tool for Windows NTFS file systems.

  • EFS enable transparent encryption and decryption of files by using advanced, standard cryptographic algorithms.

  • If a user attempts to open a file and possesses the necessary key, the file opens without additional effort on the user's part.

  • Any individual or program that does not possess the appropriate cryptographic key cannot read the encrypted data, in such case he or she receives an "Access denied" message.

  • You can protect encrypted files even from other users who are authorized to access the computer and its file system to view the data.

  • File encryption uses a symmetric key that is encrypted with the userís public key and stored in the file header. The userís private key must be available for decryption of the file.

  • If the private key is damaged or missing, even the user that encrypted the file cannot decrypt it.

  • If a recovery agent exists, the file may be recoverable. If you implement key archival, then you can recover the key, and decrypt the file. Otherwise, the file may be lost.

  • This encryption system is commonly referred to as Public Key Infrastructure (PKI).

  • The userís certificate that contains his or her public and private keys can be backed up and exported to a USB pen drive and kept in a safe place to ensure recovery, if keys become damaged or user resign.

  • EFS is supported only on NTFS file system. If a user moves or copies an encrypted file to a non-NTFS file system, USB Pen Drive or Floppy Disk, the file will no longer be encrypted.

 

Exercise EFS Encrypting File / Folder

  • Log on to computer using any user having Administrator rights, letís say SAM, Enter user name and Password.

  • Click on Computer icon, Select Local Disk (C:), Right click on empty space and Create new Folder name ENCR DATA.

  • Double Click on ENCR DATA folder, then right click on empty space in name column and select NEW, then click Text Document.

  • Double click on newly created Txt document and type some message.

  • Save the file and Close it.

  • Press Windows Key in Start Screen on Top Right hand side, Right click SAM user and click Sign out.

  • Now log on using another user having Administrator rights, letís say SUSH, enter user name and Password.

  • Click on Computer icon, Select Local Disk (C:) and then Folder name ENCR DATA.

  • Double Click on text document created earlier.

  • Ensure that you can open it.

  • Press Windows Key in Start Screen on Top Right hand side, Right click SUSH user and click Sign out to log on using earlier administrator name.

  • Log on to computer using SAM, enter user name and Password.

  • Click on Computer icon, Select Local Disk (C:),

  • Select the ENCR DATA Folder, Right click it, Select Properties, in General Tab, click on Advance button.

  • In Advance Attributes dialog box, in Compress and Encrypt attribute area enable Ģ Encrypt contents to secure data and Click OK button.

  • It will open Confirm Attribute Change dialog box, Click Apply change to this folder, subfolders and files. Click Ok button.

  • At this stage you have Encrypted folder. It will show folder in GREEN Color.

  • Now lets us verify that Encrypted file is not accessible to other users or even Administrator.

  • Press Windows Key in Start Screen on Top Right hand side, Right click SAM user and click Sign out.

  • Now log on using another user having Administrator rights, Enter user name and password for SUSH.

  • Click on Computer icon, Select Local Disk (C:) and then Folder name ENCR DATA.

  • Double Click on text document created earlier.

  • Now when you try to open text document it gives ACCESS Denied Error.

 

Users need asymmetric key pairs to encrypt data by following ways:

1) From a CA (Certificate Authority). An internal or third-party CA can issue EFS certificates. This method provides central management and back-ups of keys.

2) By self-generating them. If a CA is unavailable, users can generate a key pair. These keys have a lifespan of 100 years. There is no centralized management, and users become responsible for managing their own keys. Although it is difficult method it is still a popular method as no setup is required.

 

Pr.Pg border                                              Next Pg