70-687 MLO Lab 07_Andrew_Spiker

docx

School

Ivy Tech Community College, Indianapolis *

*We aren’t endorsed by this school

Course

SVAD236

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

6

Uploaded by CorporalWorldRam29

Report
70-687 Configuring Windows 8 L AB 7 CONTROLLING ACCESS TO LOCAL HARDWARE AND APPLICATIONS THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES: Exercise 7.1 Installing Remote Server Administration Tools Exercise 7.2 Configuring Removable Storage Access Policies Exercise 7.3 Using AppLocker Lab Challenge Creating an AppLocker Rule Based on File Hash Exercise 7.1 Installing Remote Server Administration Tools Overview In this exercise, you will install the Remote Server Administration Tools on a computer running Windows 8 so that you can use Active Directory tools and other administrative tools on a Windows 8 worktsation. Mindset Since users work from their client computers, it is always convenient to have the Remote Server Administration Tools available on the administrator’s client computer. `Completion time 20 minutes
70-687 Configuring Windows 8 Question 1 Which two tools are used to administer users for Active Directory? Active Directory Admin Center or Active Directory users and computer 11. Take a screen shot of the Administrative Tools window by pressing Alt+Prt Scr and then paste the resulting image into the Lab 7 worksheet file in the page provided by pressing Ctrl+V . Exercise 7.2 Configuring Removable Storage Access Policies Overview In this exercise, you will restrict the ability to write to an optical disk. Mindset To prevent users from copying confidential information to a removable disk, you can create Removable Storage Access Policies. Completion time 15 minutes Question Which policy setting prevents writing to a USB device?
70-687 Configuring Windows 8 2 Removable Disk: Deny write access 16. Take a screen shot of the Group Policy Management Editor window by pressing Alt+Prt Scr and then paste the resulting image into the Lab 7 worksheet file in the page provided by pressing Ctrl+V . Exercise 7.3 Using AppLocker Overview In this exercise, you will use AppLocker to restrict access to an application. Mindset To control what applications a user can run on her machine, you can create a GPO that will restrict or allow applications. Completion time 15 minutes Question Based on the default rules that appear in the Executable
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
70-687 Configuring Windows 8 3 Rules folder, which programs can a typical user run on a Windows 8 workstation? Which programs can members of the Administrators group run? All files in Program files and windows folder And on admin all files Question 4 Based on the default rules that appear in the Windows Installer Rules folder, which Windows Installer files can a typical user run on a Windows 8 workstation? Which Windows Installer files can members of the Administrators group run? Users can run All digitally signed windows installers All installer files in the System And admin All windows installer files Question 5 Why is it necessary to create the additional rule for the Group Policy Creator Owners group? Because there is no rule yet added you have to add a defalt rule. 19. Take a screen shot of the Group Policy Management Editor console displaying the contents of the Executable Rules container by pressing Alt+Prt Scr and then paste the resulting image into the Lab 7 worksheet file in the page provided by pressing Ctrl+V .
70-687 Configuring Windows 8 Lab Challenge Creating an AppLocker Rule Based on File Hash Overview In this exercise, you will create a rule that will deny users from running the Math Input Panel (mip.exe) based on the file hash. Mindset Sometimes, when administrators block a file based on a specific path, some users will try to install or copy a file to a different folder and run the program from there. You can block a file based on file hash, which will stop the program from running no matter where it is being executed from. Completion time 10 minutes During this exercise, you will create an AppLocker rule that will deny users from running the Math Input Panel based on file hash. The Math Input Panel file is located at C:\Program Files\Common\microsoft shared\ink\mip.exe. Write out the procedure you used to configure the settings, and then take a screen shot of the container where the settings are located by pressing Alt+Prt Scr and then paste the resulting image into the Lab 7 worksheet file in the page provided by pressing Ctrl+V . Open up group policy management editor Drop down to windows settings > Security Settings > AppLocker > Excutable rules Right click new rule >next > deny > File hash browse file nip.exe >next > create
70-687 Configuring Windows 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help