Implementing Client Protection
The "Implementing Client Protection" module provides you with the instruction and Server hardware to develop your hands on skills. This module includes the following exercises: Enabling User Access Control, Configure Encryption of Offline Folders, Configuring AppLocker.
Already have an account? Sign In »

Introduction
The Implementing Client Protection module provides you with the instruction and Server hardware to develop your hands on skills. This module includes the following exercises:
- Enabling User Access Control
- Configure Encryption of Offline Folders
- Configuring AppLocker
Exercise 1 - Enabling User Access Control
In this exercise, you will learn the following using Windows Server 2008 R2:
- Configuring UAC in Windows
- Configuring encryption of offline folders
- Configuring software restriction policy
- Configuring AppLocker
To learn more about UAC, file encryption, software restriction policy and AppLocker, please refer to your course book or reference material or use your preferred search engine to research the above topics in greater detail.
User Access Control is a technology and security infrastructure deployed in Microsoft windows server 2008 and windows vista. It improves the security of Microsoft windows system and allows application software trusted by user to run.
In this task, you will learn to enable user access control.
Exercise 2 - Configure Encryption of Offline Folders
Offline files are used by users even when the network connection to the server is unavailable or slow. When working online, file access performance is at the speed of the network and server. When the server is unavailable or the network connection is slower than a configurable threshold, files are retrieved from the Offline Files folder at local access speeds.
In this task, you will learn to set the offline options for the shared folder and then configure encryption on offline folders.
Exercise 3 - Configuring AppLocker
AppLocker is a feature in Microsoft Windows 2008 that permits you to state which users or groups can run specific applications in your organization based on unique identities of files. If you use AppLocker, you can create rules to allow or deny applications from running.
In this task, you will learn to configure AppLocker for Internet Explorer.
See the full benefits of our immersive learning experience with interactive courses and guided career paths.