官术网_书友最值得收藏!

Summary

In this chapter, you learned about the use of User Account Control to prevent unwanted programs, such as malware, from being installed on a computer. You learned about the two types of elevation prompts and also learned how to configure UAC notifications.

Furthermore, you learned what threat protection is and what types of threat protection there are. Using many of the built-in Windows Defender features makes your computer much safer. You learned what the security baselines are and how you can implement them. To protect company information, you can use Windows Information Protection.

Another form of security that you can implement is encryption. In this chapter, you learned about BitLocker and Encrypted File System. More organizations are embracing BitLocker rather than EFS, but EFS is not a bad choice.

The last thing you learned about is how AppLocker works and how you can configure AppLocker with specific application-independent rules.

In the next chapter, you will learn about the fundamentals of how you can configure connections, such as LAN and Wi-Fi.

主站蜘蛛池模板: 边坝县| 广州市| 通海县| 莱芜市| 东兴市| 师宗县| 环江| 石家庄市| 慈溪市| 兴国县| 遂川县| 舒城县| 五家渠市| 大安市| 武城县| 安乡县| 尤溪县| 土默特右旗| 禹州市| 迭部县| 三台县| 宜丰县| 阿勒泰市| 白玉县| 天津市| 桂林市| 南陵县| 蒙阴县| 大荔县| 武城县| 隆子县| 北川| 新民市| 西林县| 梁河县| 汾西县| 福安市| 冷水江市| 兰州市| 宁陕县| 廊坊市|