6.1 Hardening the Server and Client Part 1
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
Hello and welcome back to savories Empty. A 98 3 67 security Fundamentals certification Prep course.
00:09
Let's begin by taking a look at margin number five and entitlements. Modern is hardening the server and decline.
00:17
Now let's take a look at the learning objectives and order, which they're gonna be covered. Today we will begin. My first are discussing protecting the client computer.
00:25
The next Adam Arjuna is managing the client security using Windows Defender,
00:31
and the last item to discuss in this particular video is protecting your email. Additional topic to discuss and other videos or upcoming videos is securing your Internet. Explore configuring Microsoft Edge Technique, your server using security baselines. Lock down your vice and run on Lee Trusted application
00:49
and last night's It Leaves, which managing Windows
00:52
store application.
00:55
Now let's begin by engaging in a pre assessment question, and the course is follow. What Mayor were gives administrators level control alway computer system. Is it eh?
01:04
Root kit? Is it be Trojan horse? See a worm or D spyware?
01:11
The correct answer would be a root kit. A root kit is a software or hardware device designed to gain administrative level control over computer system without being detected.
01:22
The root kit did what they could do that can target your bios, your hyper visor, your boot loader, your colonel again, libraries and also other applications. So let's begin by first started finding exactly what Mayor where is now. Matt Way is in its software that gives partial toe full control of the computer to do whatever the mayor were created. Ones
01:41
mirror could be a virus, a warm or Children.
01:44
It could be at where. Spyware root kit. The damage done various from something slight as changing the author's name on a document to full control of your machine. Without your ability. Easy, find out most men where requires a used to initiate this operation. Some vagueness of attacks include attachments and e mails
02:00
browsing a malicious website that installed software
02:04
after user getting clicks on the pop up.
02:07
Then let's take a look at that virus. Not virus is a binary pattern, a screening ones and zeros that identifies a specific virus by chicken. A programmer filed against a list of virus definitions. Antivirus software can determine if the program off file contains a virus.
02:27
Now we look at a warm a worm is a type of malicious software or were made aware that replicates itself. Why moving across the computer's leaving copies of itself in the memory of each computer in its path down worms can use it spread by using security holes found with a new operating system. Or perhaps we doing TCP I
02:46
be happy software type implementation
02:51
That brings us to again. Take a look again at Children, horse and spyware. Now these programs could be even more dangerous. They're both formed. They are both forms of malicious software, also called men. Where spot, Where is the subway has installed on your computer, either directly or in a very early
03:07
Children horse program is similar to spiral, except that his package
03:12
as another program.
03:16
Now when you're looking back doors and root kits, a backdoor is a way of accessing your computer without going through the normal access routes, such as Internet, a name or pass work. It could be a stalled by a virus or even by a legitimate program. A root kit could be used to open a back door line a hacker into your system.
03:36
Let's take a look again at some of the symptoms and these again some indicators of a potential virus. You could have a poor operating system performance. You can have computers. You stopped responding again. Frequently, it cannot start a program. So again, this is just a list of some symptoms
03:53
of a probability of you have incurred a virus
03:57
here, get on some additional. A symptom is well, for example, when I mention one here, programmer files are suddenly missing again. That could be an indicator of a virus. Your files have become corrupted. So again, d again, these again, some additional listing off some various symptoms of a potential various.
04:15
Now, one of things wouldn't think about when you think about protecting against what we call male, where the first step you that should be taken to protect yourself against men, where it's a keep your system up to date. Obviously, with the latest patches, security patches and other critical patches. Get Microsoft often time coming with updates and other businesses well, but I want to make sure
04:33
again that we protect our system by making sure we have the latest updates.
04:39
Then we come to a virus host. Now, this is the email that provides a warning about a virus, a warm or other, some other type of disaster and urges the recipient of Fort a message. Now these e mails are often sent for what appears to be a reliable source, which can make
04:54
which can take make determining whether he they're missing difficult. For example,
04:59
although hosts are using benign, they suggest that recipients they lead important files within computer or download and infected attachment.
05:08
Another important thing at the mention. Force keeping your computer up. The Date of Good Examples With Windows Update. It's a service invited by Michael of the device updates for the Microsoft Windows operating system and is installed components including, for example, in an Explorer
05:23
addition. Information again by Windows updates again. It's available Windows 10 for example, against a surfer Windows nine. When those anti winners tend the service that level software upgrades for your windows, as well as various Microsoft antivirus products, including Windows defenders as What's Michael's off Security Essentials
05:41
Here, again is a screenshot of winners update. Again, this is a free service that's used with updates like service, fax and patches for Microsoft Windows operating system and other operating system as well,
05:55
they say. We'll take a look again and define again. Take a look again at a witness. Service Software updates service. That's what is a six system. What we call a sitter configuration again. Manager. Now the winners of this service is a free ad on application offered by Microsoft that can be downloaded and what it does. It manages updates and patches again
06:15
for your system.
06:16
Again, we also again have again the other items I mention before
06:20
again we have another put it we often referred to as being a su serve as well,
06:26
and we also again having a another one called again the Windows Update Service. A suit server will be habits SS CME again that lies to keep those system update as well. Now the advantage of using one or two of these and they allow you again, you're provide your ability to touch those patches out.
06:42
Scheduled updates again opposite prioritize clients, updates
06:46
another important item that we find it's called a user account control. Now again, it's a window feature that sets level a user authorization with an operating system with a user again account control instead of you. Start with the basic purpose until minutes great allows new privileges for that particular user, but again, it can help protect you from again. Manuel.
07:08
He begins another screen shot of that. It's a feature that was designed to prevent unauthorized changes to your computer. When function, it could potentially affect you again. When function that could potentially affect your computer system. Embracing what happened, the USC will prompt for permission for the minute spread outward. Actually, are you sure you want to do that basic? That's the type of message you be receiving.
07:28
He again is another screen shot
07:30
with this when you're able to set the different levels again of security, uh, again, you can always say that. Always notify. You can actually said it wouldn't know if I'm the only one programs APs. I've tried to make change their mind cuter, so you have to build it and make those adjustments on that particular we called the user account control. Are you a C type? Settings.
07:46
Another important features of the firewall not find walking. Hip event hackers are malicious software. Such worms
07:53
from gaining access to your computer through a network order in a a farmer can also help stop your computer from sending malicious software to other computers are not important. Components called Are offline files. Now this is very useful. It's a sink feature within Windows 78 and 10. Which a lot works with your sink Realization Civilization Center With the hip of this all
08:13
information call. Often on fouls can be in synchronized between computers
08:16
and your network service and the network files kept available. Even if your file, for example, computers down, whatever the case may be, you still have access those files off line.
08:26
Another important thing when I think about is called Windows Defender is it again? It's a great protection
08:31
again. So basically, it's decided to take your computer against viruses spy when other types of mayor wears well.
08:39
Now one of things is very important for us when we look at protect, not email, because we realized me e mails becoming a central service for virtually every organization. Nowadays, one of the most important things you want to do makes you create a scoring password again. You want to make sure that password is complicated. Don't use the same password and never use past with a part of your
08:58
of your password as well so no news. Any words that a part of your password?
09:03
Another thing that we can do is implement Spam Petrus. Now it's a program that we used to detect unsolicited, unwanted email and prevent those mints from getting to the user's inbox. Like other type of filtering programs, spam filters look for certain criteria, which it bases a judgment. But again, this filter
09:20
will not catch every single spam message that you actually,
09:22
perhaps our been bombard it with.
09:24
We have another term called Cinda Policy Framework. Again, this is an email authentication method designed to take Fortune cinder addresses. An email, other words call email spoofing. It's a technique used in fishing and as well as email spam as well.
09:39
We have a term called SMTP Simple mail transport protocol. Again, we look at the relay. Now. This really is a protocol that allows email to be transmitted through the Internet, collecting email again from the center and deliver it to the recipient local post office box or another simple mail transport protocol.
09:58
Not doing this particular presentation to discuss protecting your client computer, we talked about managing your client security using Windows defender but technically email in the upcoming presentation or video. Wouldn't we could kidding continue on by discussing security, Internet Explorer, configuring Max off EJ and so forth. So let's take conclude with a post assessment quiz.
10:18
What may work, Alexei. Use of personal information on details about your browsing habits
10:24
without your knowledge is a virus. Is it be our Children horse, is it see a worm or D spyware?
10:31
If you said like that, D you're absolutely correct.
10:37
Let's take a look at the top school discussing upcoming presentation again, ranging from securing and explore our way down to manage our window store application.
Up Next
Course Assessment - MTA 98-367 Security Fundamentals
Assessment
30m
Instructed By
Similar Content