70-687 MLO Lab 07_Andrew_Spiker
docx
keyboard_arrow_up
School
Ivy Tech Community College, Indianapolis *
*We aren’t endorsed by this school
Course
SVAD236
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
6
Uploaded by CorporalWorldRam29
70-687 Configuring Windows 8
L
AB 7
CONTROLLING ACCESS
TO LOCAL HARDWARE AND APPLICATIONS THIS LAB CONTAINS THE FOLLOWING EXERCISES AND ACTIVITIES:
Exercise 7.1
Installing Remote Server Administration Tools
Exercise 7.2
Configuring Removable Storage Access Policies
Exercise 7.3
Using AppLocker
Lab Challenge
Creating an AppLocker Rule Based on File Hash
Exercise 7.1
Installing Remote Server Administration Tools
Overview
In this exercise, you will install the Remote Server Administration Tools on a computer running Windows 8 so that you can use Active Directory tools and other administrative tools on a Windows 8 worktsation.
Mindset
Since users work from their client computers, it is always convenient to have the Remote Server Administration Tools available on the administrator’s client computer. `Completion time
20 minutes
70-687 Configuring Windows 8
Question
1
Which two tools are used to administer users for Active Directory?
Active Directory Admin Center or Active Directory users and computer
11.
Take a screen shot of the Administrative Tools
window by pressing Alt+Prt Scr
and then paste the resulting image into the Lab 7 worksheet file in the page
provided by pressing Ctrl+V
.
Exercise 7.2
Configuring Removable Storage Access Policies
Overview
In this exercise, you will restrict the ability to write to an optical
disk.
Mindset
To prevent users from copying confidential information to a removable disk, you can create Removable Storage Access Policies.
Completion time
15 minutes
Question
Which policy setting prevents writing to a USB device?
70-687 Configuring Windows 8
2
Removable Disk: Deny write access
16.
Take a screen shot of the Group Policy Management Editor window by pressing
Alt+Prt Scr
and then paste the resulting image into the Lab 7 worksheet file in
the page provided by pressing Ctrl+V
.
Exercise 7.3
Using AppLocker
Overview
In this exercise, you will use AppLocker to restrict access to an application. Mindset
To control what applications a user can run on her machine, you
can create a GPO that will restrict or allow applications.
Completion time
15 minutes
Question
Based on the default rules that appear in the Executable
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
70-687 Configuring Windows 8
3
Rules folder, which programs can a typical user run on a Windows 8 workstation? Which programs can members of the Administrators group run?
All files in Program files and windows folder
And on admin all files
Question
4
Based on the default rules that appear in the Windows Installer Rules folder, which Windows Installer files can a typical user run on a Windows 8 workstation? Which Windows Installer files can members of the Administrators group run?
Users can run All digitally signed windows installers
All installer files in the System
And admin All windows installer files
Question
5
Why is it necessary to create the additional rule for the Group
Policy Creator Owners group? Because there is no rule yet added you have to add a defalt rule.
19. Take a screen shot of the Group Policy Management Editor
console displaying the
contents of the Executable Rules
container by pressing Alt+Prt Scr
and then paste the resulting image into the Lab 7 worksheet file in the page provided by pressing Ctrl+V
.
70-687 Configuring Windows 8
Lab Challenge
Creating an AppLocker Rule Based on File Hash
Overview
In this exercise, you will create a rule that will deny users from running the Math Input Panel (mip.exe) based on the file hash.
Mindset
Sometimes, when administrators block a file based on a specific path, some users will try to install or copy a file to a different folder and run the program from there. You can block a file based on file hash, which will stop the program from running no
matter where it is being executed from.
Completion time
10 minutes
During this exercise, you will create an AppLocker rule that will deny users from running the Math Input Panel based on file hash. The Math Input Panel file is located at C:\Program Files\Common\microsoft shared\ink\mip.exe. Write out the procedure you used to configure the settings, and then take a screen shot of the container where the settings are located by pressing Alt+Prt Scr
and then paste the resulting image into the Lab 7 worksheet file in the page provided by pressing Ctrl+V
.
Open up group policy management editor
Drop down to windows settings > Security Settings > AppLocker > Excutable rules
Right click new rule >next > deny > File hash browse file nip.exe >next > create
70-687 Configuring Windows 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help