1. Collect – send data collection packets out to collect information about applications that are running, Analyze – organizing all the data collected and add compatibility issues, Test and Mitigate – make the determination whether the compatibility issues are real problems on the network
2. Move the site to the Trusted Sites zone, disable protected mode on IE, and modify the application.
L7 Scenarios
7-1: The method I would use would be the SmartScreen filter. With IE 8 and SmartScreen filtering it uses the following to prevent phishing:
Online look up of phishing sites – which is a maintained list of phishing sites updated several times an hour.
Online look up of download sites – when a download is started IE checks the source.
Onsite analysis – IE examines the download as it’s being processed onto your computer.
7-2: She will have to create two rules, an allow rule which will grant the ResDev group access, and a deny rule that will only apply to the RDint group. L8 Review questions
1. Instances make it easier to monitor more than one of the same component.
2. Because the updates will be downloading and there is no requirement for the employees to not be on the workstations but there will be times when the updates install the employee might need to restart the workstation to implement the update that installed.
L8 Scenario
8-1: I have to first go into Group Policy > Specify intranet Microsoft update service location, which is where I will specify the name of the WSUS server that I want my clients to access. After that you will be able to set up the Configure Automatic Updates and other settings to configure the behavior of the Windows Update clients.
L9 Review Questions
1. Because it displays all elevation prompts on the secure desktop, which can receive messages only from Windows processes which prevent any active Malware to continue into the secure desktop.
2. A group is an identifying token that Windows uses to