Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Exam MD-100 Windows 10 Certification Guide

You're reading from   Microsoft Exam MD-100 Windows 10 Certification Guide Learn the skills required to become a Microsoft Certified Modern Desktop Administrator Associate

Arrow left icon
Product type Paperback
Published in May 2020
Publisher Packt
ISBN-13 9781838822187
Length 442 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Jeroen Burgerhout Jeroen Burgerhout
Author Profile Icon Jeroen Burgerhout
Jeroen Burgerhout
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Section 1 : Deploying Windows
2. Chapter 1: Deploying Windows 10 FREE CHAPTER 3. Chapter 2: Upgrading Windows 10 4. Chapter 3: Customizing and Configuring Windows 10 5. Section 2 : Managing Devices and Data
6. Chapter 4: Managing Local Users, Groups, and Devices 7. Chapter 5: Configuring Permissions and File Access 8. Chapter 6: Configuring and Implementing Local Policies 9. Chapter 7: Securing Data and Applications 10. Section 3: Configuring Connectivity
11. Chapter 8: Configuring Various Networks 12. Chapter 9: Configuring Remote Connectivity 13. Section 4: Maintaining Windows
14. Chapter 10: Understanding Troubleshooting and Recovery 15. Chapter 11: Managing Updates 16. Chapter 12: Managing Log Files 17. Chapter 13: Mock Exam (A and B) 18. Assessments 19. Other Books You May Enjoy

Chapter 7: Securing Data and Applications

Security is essential for your devices and your end users. Data leakage seems to occur very often nowadays. Almost every day, you read that a company, a web shop, or a forum has been hacked and that their customers' details are for sale on the dark web. In this chapter, you will about learn some relevant security features that you can implement in Windows 10 to secure your system.

This chapter introduces the sixth objective, which is to know how you can configure the User Account Control (UAC) prompts, set threat management, implement disk and file encryption, and use AppLocker to control whether or not the end user can open applications.

The following objectives will be covered in this chapter:

  • Configuring User Account Control
  • Configuring Threat Protection
  • Implementing encryption
  • Using AppLocker

By providing you with the skills to configure User Account Control, configure Threat Protection, and implement...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime