Windows 10 Security

Watch Windows 10 Security

  • 2015
  • 1 Season

This is an overview of security that can be found in Windows 10. The topics that are covered range from data security, host security, application management to recovery of the operating system. This is for a broad range of individuals including help-desk to the average end-user seeking to implement a more secure Windows 10 environment.

Filter by Source
No sources available
Seasons
Security in CLI
20. Security in CLI
January 1, 2015
In this episode, Ronnie and Wes take introduce managing permissions from the command prompt. They demonstrate how to modify, add, and remove permission from files and folders within the Windows Directory structure. Using iscacls, they show the ability for the system administrator to script out permissions when necessary.
Microsoft Intune
19. Microsoft Intune
January 1, 2015
In this episode, Ronnie and Wes take a look at using Micrsoft Intune to help with securing Windows 10 machines. Even though Intune can help with many different devices, they focus in on securing Windows 10 machines within the domain and also standalone machines outside the domain environment.
Remote Access
18. Remote Access
January 1, 2015
Wes and Dan explore some of the ways you might securely connect to a private network from a remote location using Windows 10. They start by configuring a VPN connection using the Windows 10 VPN client and discuss the different protocols used to secure VPN connections; including Point to Point Tunneling Protocol(PPTP), Layer 2 Tunneling Protocol(L2TP), and Secure Sockets Tunneling Protocol(SSTP).
Windows Security
17. Windows Security
January 1, 2015
Daniel and Wes look at configuring a Windows 10 client to connect securely to a wireless network. First they go over the different encryption types (WEP/WPS/WPA/WPA2) that may be supported by any given access point. Then they jump to the Windows 10 client and configure things like the Windows Firewall profile as well as showing how to connect to a secure wireless network.
Backup and Recovery
16. Backup and Recovery
January 1, 2015
Daniel and Wes explain how to secure the availability of your data by implementing good data redundancy practices through backup and recovery procedures. They start by describing File History for quick file recovery, then explore the Windows Backup and Restore utility to create a system image and system repair disk.
Auditing
15. Auditing
January 1, 2015
Daniel and Wes show you how to check for security issues by utilizing the auditing features found in the Windows 10 operating system. They take a look at Application Logs, System Logs, and Security Logs; showing each of the log's ability to provide information on attempted or successful security breaches. They also discuss using Disk Quotas to help limit the fallout of certain types of attacks.
Certificates
14. Certificates
January 1, 2015
Daniel and Wes explore securing your Windows 10 environment by using certificates. Here they explain some of the ways in which Windows 10 uses certificates for both the User and Machine to verify identity. Then they show how to work with certificates using the Certificate Manager. Lastly they explain what a Certificate Authority(CA) is and the difference between a Public and Private CA.
Application Management
13. Application Management
January 1, 2015
In this episode, Wes and Daniel look into implementing different methods of application management to secure your Windows 10 environment. They show you how to control software installation and execution using tools like AppLocker, Assigned Access, and Sideloading. Then they move into environment isolation by setting up virtual machines in Hyper-V.
Account Management Part 2
12. Account Management Part 2
January 1, 2015
Daniel and Wes continue Windows 10 security through account management. They begin by continuing their discussion about the features of using a Microsoft account for authentication, both pros and cons. They also discuss the benefits of using Single Sign-On account and where you might run into SSOs. Also discussed is Domain and Workgroup accounts and how they differ in use and security management.
Browser Security
9. Browser Security
January 1, 2015
Viewers will hear how to stay safe in the wilds of the internet by taking advantage of the features found in the web browser; specifically Internet Explorer and Edge. They walk through each of the tabs in Internet Options pointing out the settings that can be used to increase security and cover other browsing safety mechanisms like ActiveX filtering, SmartScreen filtering, and Tracking Protection.
Group Policy Management
8. Group Policy Management
January 1, 2015
Daniel and Wes show you how to create a more fundamentally secure environment in Windows 10 by implementing local group policy. Here they explain what local group policy is, how to configure it, and some of the ways that you can secure your PC, like restricting access to the registry. They also show how to create multiple policies for applying different levels of access depending on user roles.
Host Security Part 2
7. Host Security Part 2
January 1, 2015
In this episode, Wes and Daniel continue explaining host security hardening techniques, here starting with the Windows Firewall. They show you how to use the Windows Firewall to allow wanted programs and protocols to interact with your PC while simultaneously blocking unwanted or unnecessary items. They also show you how to create security connection rules and check security associations.
Authentication
4. Authentication
January 1, 2015
In this episode, Wes and Daniel walk you through securing your Windows 10 PC through many different authentication methods. They start with the venerable password authentication method. Here they show you how to create a secure password and how to enforce good password policies in Windows 10. Then they demo some of the newer authentication methods like Picture Passwords, PINs, and Windows Hello.
Data Security
1. Data Security
January 1, 2015
In this episode, Wes and Daniel explain how to secure data on a Windows 10 machine using permissions. They start by explaining the New Technology File System(NTFS) permissions, both the standard and special sets. They they show you how shared permissions work and how they integrate with NTFS permissions.
Description
  • Premiere Date
    January 1, 2015