Anti-Malware Software
An essential requirement for any computer that has access to the Internet today is the use of anti-malware software. Attackers are constantly creating new methods and techniques to infect your system with malicious software (malware).
Years ago, malware was less focused. It would sometimes wait until a specific day and pop up a relatively harmless message like "Legalize Marijuana." Other malware would delete data or corrupt the hard drive. However, malware is much more focused today. Attackers want money and data.
Most malware today has the specific goal of gaining information about you or your organization. The information about you may be used to steal your identity, impersonate you, or hack into your online bank accounts. The number of people who have lost money from Internet-based attacks continues to grow. Other times, corporate or governmental espionage is used to gain secrets. Malware is commonly used to exploit weaknesses and unpatched vulnerabilities in systems.
Anti-spyware Anti-spyware software is intended to protect against spyware. Spyware is software that can install itself or run on your computer without your knowledge or consent. It often is used to monitor your online activities, collect personally identifiable information, and report this back to the attacker.
Antivirus Antivirus software is intended to protect against viruses, worms, Trojan horses, rootkits, and other malware. Many current antivirus software products also protect against spyware.
Malware is identified through definitions. Each piece of malware has a specific signature similar to a fingerprint that can be used to identify it using anti-malware software. Just as it's important to keep systems up to date, it's also important to keep anti-malware definitions up to date.
In this tutorial:
- Managing Windows 7 in a Domain
- The Domain
- What is Wrong with Workgroups
- The Domain Concept
- Active Directory
- Domain Security
- Joining a Domain
- Windows 7 Offline Domain Join
- Browsing the Domain
- Searching the Domain
- Custom Searches
- Assigning Permissions to Domain Members
- The Double-Thick Security Trick
- Creating a Test Bed
- Creating a Domain
- Installing Windows Server 2008 on vPC
- Configuring a Windows Server 2008 Server
- Promoting a Server to a Domain Controller
- Joining Windows 7 to a Domain
- Authentication vs Authorization
- Authentication
- Authorization
- Built-in Groups
- Organizing Users with Groups
- Group Scope and Group Type
- Creating Users and Groups in a Domain
- Using HomeGroup with a Domain-Based Computer
- Identifying and Resolving Logon Issues
- Hardware vs. Network
- Using Cached Credentials
- Password Expiration
- Determining Logon Context
- Logon Hours Compliance
- Restricting Computer Access
- Time Synchronization
- Understanding User Profiles
- Standard Profiles
- Roaming Profiles
- Implementing Roaming Profiles
- Mandatory Profiles
- Super-Mandatory User Profiles
- Modifying the Default User Profile
- Configuring Settings with Scripts
- Anti-Malware Software
- Microsoft Windows 7 Defender
- Third-Party Anti-malware Software