Time
33 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:00
Hello. My name is Dustin and welcome to Windows Security. We're gonna go through just another quick demo of downloading it and running it for the first time. So let's go ahead and hop back into our window seven. Virtual Machine and we'll get started.
00:13
Okay? So you can get a match or the Enhanced Mitigation Experience toolkit from Microsoft's Web site. This one is Ah, download I d 54 to 6 and this is an older version. I have downloaded it already, So let's go ahead and run the installer
00:30
and right here is just the email it set up. So we will go ahead and run that
00:38
and you just agree. Delights his agreement, Of course. So we'll go and start the installation.
00:57
And if you remember, E Met is used to
01:00
protect, um, third party
01:04
applications and stuff that may not be able to be patched. And it's got those mitigation techniques to stop malware, anything attacking that application in memory. So we're gonna use the recommended settings. It looks like it will add protections for Internet Explorer WordPad, office
01:23
Acrobat, reader, Java. So it's kind of some normal things that you've got on there
01:26
and it will add trust rules for Mike Soften. A couple other popular online service is and we will enable reporting through the Windows event logs who does quite a bit already just by using the standard settings.
01:41
So let's go ahead and close that,
01:45
and we will start it. Seeing there. It is the enhanced mitigation, experienced tool kit,
01:53
and it does have a nice, gooey
01:55
clothes. All this stuff here.
01:59
All right, so it looks like we do have, um, some settings right away. Important export. That's where you can actually import or export configurations so that if you've got it set up for, like a domain computer and you need to have the same profile on a bunch of different computers, you can export it and then imported into that one.
02:17
So
02:20
most stuff is application. Opt in and looks like that
02:23
is all set up here. So let's go ahead and click applications here,
02:29
and this whole list the applications that it's already protecting in. In order to add an application, you can just click the add application,
02:37
and here's where you'll actually browse to it. So let's go ahead and go to our desktop. Um, public
02:45
actually see user. This time there goes, Let's go ahead and protect process Hacker
02:53
and we'll add it here. And here's the different options to protect it, and we're gonna go ahead and protect everything on it. So you just click, okay,
03:01
and that's all you need to do.
03:04
It will add the memory protections against any software. There may be some compatibility issues with certain things, but most of the stuff I've done has all ran fine.
03:16
And it's as easy as that. You can see what processes air currently running and refresh that. And then if we launch process hacker,
03:28
it's still running exactly the same. We're not running into any issues, but it's being protected, protected in the background by that enhanced mitigation experience toolkit.

Up Next

Fundamental Windows Security Overview

In Fundamental Windows Security Overview, we examine secure computing within a Windows environment with tools such as the baseline security analyzer, Windows Firewall, and Microsoft Defender. We also provides ways in which a user within a Windows environment can ensure a secure network connection via proper configuration of Ipsec, IIS, and RDP.

Instructed By

Instructor Profile Image
Dustin Parry
Network Security Engineer
Instructor