官术网_书友最值得收藏!

Summary

In this chapter, you learned about the use of User Account Control to prevent unwanted programs, such as malware, from being installed on a computer. You learned about the two types of elevation prompts and also learned how to configure UAC notifications.

Furthermore, you learned what threat protection is and what types of threat protection there are. Using many of the built-in Windows Defender features makes your computer much safer. You learned what the security baselines are and how you can implement them. To protect company information, you can use Windows Information Protection.

Another form of security that you can implement is encryption. In this chapter, you learned about BitLocker and Encrypted File System. More organizations are embracing BitLocker rather than EFS, but EFS is not a bad choice.

The last thing you learned about is how AppLocker works and how you can configure AppLocker with specific application-independent rules.

In the next chapter, you will learn about the fundamentals of how you can configure connections, such as LAN and Wi-Fi.

主站蜘蛛池模板: 日照市| 宜城市| 叶城县| 商南县| 通江县| 万年县| 新民市| 达孜县| 彭泽县| 社会| 建水县| 民权县| 前郭尔| 南城县| 辽阳县| 凤庆县| 涞源县| 福州市| 乐都县| 尚志市| 雷山县| 麦盖提县| 阿拉善盟| 临颍县| 双峰县| 揭西县| 宣化县| 龙里县| 岚皋县| 霍州市| 南京市| 青浦区| 沁源县| 苏尼特右旗| 崇阳县| 孟州市| 张家界市| 普兰县| 丽江市| 巴塘县| 万年县|