SlideShare a Scribd company logo
1 of 5
Download to read offline
A GUIDE TO UNDERSTANDING AND
IMPLEMENTING MICROSOFT WINDOWS SECURITY
Today, Information Security is the most important thing to be taken care of while using the Internet.
Internet, Being a source of knowledge, learning and entertainment, it is also something that can be
misused for malicious and destructive intent.
Learn more about configuration settings that could potentially help to improve your Windows Security,
protecting and defending your data from malicious actors.
So what do I mean by "Securing Windows"?
Windows being the most widely used operating system, Its users are vulnerable to data theft, Identity
theft and cracking. By taking some precautions and a few good practices, you can secure your Windows
computer, easily and effectively.
Security is a big field altogether in the world of computers, there are huge corporations that only
specialize in security. This article is for the type of security you can use for your home computer and not
it is not for huge corporate setups, since they have a much larger perspective.
To begin with, let me summarize the points that I am going to cover in this article
1. Understanding Windows processes that run in the background.
2. Antivirus software, and sources of viruses
3. Firewall
4. Security tips and tricks
Understanding Windows Processes
Every software, application we install in our computer runs as a "process", it is a way that the computer
can keep track of running software, close it, or even modify it in some cases.
So where can you see them?
You can see the processes by following these steps -
1. Right-click the taskbar down below, select "Task Manager"
2. Select the "Processes" tab
Or - You can also open Task Manager by pressing (CTRL+SHIFT+ESC)
Once you get there, you can see all the processes that are currently running on your computer. This
gives you a detailed overview of what exactly is going on in your computer. You can see what process is
running, and how much of your system memory are they using.
Here is a list of common Windows system processes that can be found there,
Ctfmon.exe
This is involved with the language/alternative input services in MS-Office. Ctfmon.exe will continue to
put itself back into the system startup when you run the MS-Office apps as long as the Text Services and
Speech applets in the Control Panel are enabled.
Explorer.exe
This is the Windows Shell - the desktop, taskbar, icons almost everything that you see in windows is
controlled by this process
Svchost.exe
Svchost.exe (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be
stopped or restarted manually. This process manages system services that run from dynamic link
libraries (files with extension.dll). Examples for such system services are: "Automatic Updates",
"Windows Firewall", "Plug and Play", "Fax Service", "Windows Themes" and many more.
Winlogon.exe
This controls the authentication of Windows users. It is one of the most important system processes.
Rundll32.exe
This program is part of Windows, and is used to run program code in DLL files as if they were within the
actual program. DLL files are a part of the Windows programming.
Csrss.exe
This is the user-mode portion of the Win32 subsystem; Win32.sys is the kernel-mode portion. Csrss
stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all
times.
When looking at the processes, you can also see the memory they are consuming, using the task
manager process list, you can also close a non-responsive program.
From the security aspect, any Virus, Spyware will show up in this list, so this is a very important tool that
you can use when you feel you have a virus or a spyware installed on your computer.
Sometimes you can directly say whether a process is running a virus or not, when you click on it, it will
just 'slip' out of your mouse pointer and will change its position, these are the advanced viruses
designed to evade from being manually removed.
Antivirus Software
Antivirus software is one of the first and foremost thing that you must install after getting a new system,
or after you have re-installed your operating system.
Choosing the right anti-virus software is very important; it is very much dependent how fast your
computer is. An Antivirus constantly scans your system's active processes and is vigilant, so as to prevent
any threats. With thousands of viruses releasing every day, here are some things to note -
Prevention is better than cure, right?
1. Antivirus software priority - it should be the first thing you must install after getting a computer.
2. Never opt for 'Trial version', either purchase a full version, or use the free version with lesser
features. The problem with trial version is, that once it is expired, it will stop protecting your
system and trouble you with constant security alerts, which means, your computer is at risk
while you are battling with security alerts.
3. Always keep your antivirus software updated, most of the antivirus softwares update
automatically. However for some reason if they are not able to, update manually.
So why does it needs to be updated?
Companies that make these softwares release new virus Signatures or 'patterns' every week and in
some cases even daily. The antivirus on your computer must learn about those new threats, so it
downloads the new patterns from the server, while ensuring that you are protected from the latest
viruses.
Virus Sources
There is no prime source of viruses, they can come up from just anywhere. However, here are some
things you should be aware of -
1. EXE Files- Exe files are executable files that windows uses to execute or start any program,
application or even a software.
2. Exe can contain viruses, even spyware designed to track your system, Always scan a file before
opening it
3. Websites - Never accept a link from anyone whom you don't know. There are websites on the
internet specially designed to compromise your computer, they may be in a form of internet
chat, a forum, a game, or even music.
4. USB Flash Drives- we all share data, and use USB flash drives to carry our data with us. If you use
your disk on an infected system, your disk will catch that virus, and will begin infecting every
computer you insert it in. Always scan a USB flash drive before opening it.
Firewall
So what is a firewall?
In simple terms, It is an application that is designed to control and analyze the network traffic coming in
and out of your computer.
It is like your pet dog that only allows certain people into your house, while preventing unauthorized
people or intruders, at the same time alerting you at various occasions.
So why is a firewall important?
Everything that is in your computer needs to be protected. Your personal documents, photos, financial
information, even your passwords. When your computer is connected to the internet, your data is
susceptible to theft. Major corporations spend millions of dollars just on firewalls. According to a recent
news report, Sony's Play Station was hacked, and a lot of data was leaked. This cost the company
millions of dollars.
Taking little bit of care about your computer security and escalating it, can be very beneficial.
Does Windows have an in-built firewall?
For starters, newer versions of windows like the windows 7, has an amazing inbuilt firewall, also known
as the windows firewall, It allows granular control over your systems' networking, even defining rules for
applications that are installed in your computer.
Windows firewall also has different profiles like 'home network' and 'public network'. This allows easy
one click configuration, wherein you change the settings depending on the location you are using.
When you're connected to a public network like a library or a coffee shops' wireless network, you may
want to block all incoming connections and can select the public network profile.
At home or work, where you may be sharing files over the network, you can easily switch to the home
network profile.
You can access windows firewall by - clicking the Start button clicking Control Panel, clicking Security,
and then clicking Windows Firewall.
Make sure that your firewall is set to 'ON'
For advanced users, you can even install a free third-party firewall like "Comodo Firewall". It is one of
the most advanced, and free firewalls that I have encountered and the one I personally use. This is
however not recommended for basic users, since its configuration requires a very good understanding
of the windows operating systems and its architecture, and about TCP/IP.
Security tips and tricks
1. Be cautious with your computer Administrator passwords, never store them anywhere, always
memorize them, they are the key to your system. Someone who is trying to gain remote access
to your system won't get through if he cannot guess your password. Try to include a
combination of special characters, numbers and letters for your password.
2. Download softwares only from reputed websites, these include Cnet.com, FileHippo.com,
Soft32.com.
3. These websites never host malicious softwares, and always scan them with an antivirus before
hosting them.
4. Always scan your USB flash drives with your antivirus before opening it.Simply Right-click your
disk in My computer, and select 'Scan with' - your antivirus
5. Run a full system scan every month. This will help removing any viruses that have crawled in.
6. Never turn off your anti-virus software or your firewall. Many a times people suggest turning
them off.
7. If possible, get a security expert to analyze your computer once a month. A security expert will
check your computer in great detail and will suggest you to remove any programs that
may compromise your computer.
8. Windows update - Always use windows update and set it to automatic. Windows updates are
critical system patches that escalate your system security or patch any vulnerability that was
otherwise found by Microsoft security experts. Many people don't realize the significance of
Windows Update,until they are infected.
9. User account control - User account control is a security feature in windows that should always
be 'ON', it prevents the execution of malicious code.
10. Web Browser - Always update to a newer version of a web browser, they are better, faster and
more secure. Because everything today is web-based, security of your web browser is the most
important thing.
11. User Accounts - Always keep the guest account disabled, and create a new administrator
account for yourself. Never use the default administrator account.
These are the basic steps that you can use to secure your Windows computer.

More Related Content

Similar to A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY.pdf

Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virusAbrish06
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer ScienceHepsijeba
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfEric Selje
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Microsoft Office How The 2007 System Helps You To Stay Safer
Microsoft  Office  How The 2007 System Helps You To Stay SaferMicrosoft  Office  How The 2007 System Helps You To Stay Safer
Microsoft Office How The 2007 System Helps You To Stay SaferOklahoma Dept. Mental Health
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Securityvenkasureantivirus
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureUltraUploader
 

Similar to A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY.pdf (20)

Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Virus
VirusVirus
Virus
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Virus project
Virus projectVirus project
Virus project
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
Cyber security
Cyber securityCyber security
Cyber security
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdf
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Microsoft Office How The 2007 System Helps You To Stay Safer
Microsoft  Office  How The 2007 System Helps You To Stay SaferMicrosoft  Office  How The 2007 System Helps You To Stay Safer
Microsoft Office How The 2007 System Helps You To Stay Safer
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
 

More from MuhammadWaqas779561

UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdfUNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdfMuhammadWaqas779561
 
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...MuhammadWaqas779561
 
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...MuhammadWaqas779561
 
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdfBREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdfMuhammadWaqas779561
 
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdfWHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdfMuhammadWaqas779561
 
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdfMIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdfMuhammadWaqas779561
 
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdfMICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdfMuhammadWaqas779561
 
INDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdfINDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdfMuhammadWaqas779561
 
The black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdfThe black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdfMuhammadWaqas779561
 
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdfBOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdfMuhammadWaqas779561
 
Criminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdfCriminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdfMuhammadWaqas779561
 

More from MuhammadWaqas779561 (20)

UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdfUNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
 
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
 
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
 
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdfBREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
 
MICHELE TECCHIA.pdf
MICHELE TECCHIA.pdfMICHELE TECCHIA.pdf
MICHELE TECCHIA.pdf
 
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdfWHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
 
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdfMIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
 
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdfMICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
 
MICHELE TECCHIA BIOGRAPHY.pdf
MICHELE TECCHIA BIOGRAPHY.pdfMICHELE TECCHIA BIOGRAPHY.pdf
MICHELE TECCHIA BIOGRAPHY.pdf
 
INDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdfINDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdf
 
ROMANIA TOURS AND VACATIONS.pdf
ROMANIA TOURS AND VACATIONS.pdfROMANIA TOURS AND VACATIONS.pdf
ROMANIA TOURS AND VACATIONS.pdf
 
PATH TO PERMANENT RESIDENCE.pdf
PATH TO PERMANENT RESIDENCE.pdfPATH TO PERMANENT RESIDENCE.pdf
PATH TO PERMANENT RESIDENCE.pdf
 
BIOGRAPHY OF PAUL LIGNIERES.pdf
BIOGRAPHY OF PAUL LIGNIERES.pdfBIOGRAPHY OF PAUL LIGNIERES.pdf
BIOGRAPHY OF PAUL LIGNIERES.pdf
 
MICHELE TECCHIA.pdf
MICHELE TECCHIA.pdfMICHELE TECCHIA.pdf
MICHELE TECCHIA.pdf
 
Jean-Pierre Valentini.pdf
Jean-Pierre Valentini.pdfJean-Pierre Valentini.pdf
Jean-Pierre Valentini.pdf
 
The black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdfThe black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdf
 
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdfBOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
 
Paul Ligniere.pdf
Paul Ligniere.pdfPaul Ligniere.pdf
Paul Ligniere.pdf
 
Criminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdfCriminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdf
 
Yassine Yakouti.pdf
Yassine Yakouti.pdfYassine Yakouti.pdf
Yassine Yakouti.pdf
 

Recently uploaded

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 

Recently uploaded (20)

The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 

A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY.pdf

  • 1. A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY Today, Information Security is the most important thing to be taken care of while using the Internet. Internet, Being a source of knowledge, learning and entertainment, it is also something that can be misused for malicious and destructive intent. Learn more about configuration settings that could potentially help to improve your Windows Security, protecting and defending your data from malicious actors. So what do I mean by "Securing Windows"? Windows being the most widely used operating system, Its users are vulnerable to data theft, Identity theft and cracking. By taking some precautions and a few good practices, you can secure your Windows computer, easily and effectively. Security is a big field altogether in the world of computers, there are huge corporations that only specialize in security. This article is for the type of security you can use for your home computer and not it is not for huge corporate setups, since they have a much larger perspective. To begin with, let me summarize the points that I am going to cover in this article 1. Understanding Windows processes that run in the background. 2. Antivirus software, and sources of viruses 3. Firewall 4. Security tips and tricks Understanding Windows Processes Every software, application we install in our computer runs as a "process", it is a way that the computer can keep track of running software, close it, or even modify it in some cases. So where can you see them? You can see the processes by following these steps - 1. Right-click the taskbar down below, select "Task Manager" 2. Select the "Processes" tab Or - You can also open Task Manager by pressing (CTRL+SHIFT+ESC) Once you get there, you can see all the processes that are currently running on your computer. This gives you a detailed overview of what exactly is going on in your computer. You can see what process is running, and how much of your system memory are they using. Here is a list of common Windows system processes that can be found there, Ctfmon.exe This is involved with the language/alternative input services in MS-Office. Ctfmon.exe will continue to
  • 2. put itself back into the system startup when you run the MS-Office apps as long as the Text Services and Speech applets in the Control Panel are enabled. Explorer.exe This is the Windows Shell - the desktop, taskbar, icons almost everything that you see in windows is controlled by this process Svchost.exe Svchost.exe (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be stopped or restarted manually. This process manages system services that run from dynamic link libraries (files with extension.dll). Examples for such system services are: "Automatic Updates", "Windows Firewall", "Plug and Play", "Fax Service", "Windows Themes" and many more. Winlogon.exe This controls the authentication of Windows users. It is one of the most important system processes. Rundll32.exe This program is part of Windows, and is used to run program code in DLL files as if they were within the actual program. DLL files are a part of the Windows programming. Csrss.exe This is the user-mode portion of the Win32 subsystem; Win32.sys is the kernel-mode portion. Csrss stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all times. When looking at the processes, you can also see the memory they are consuming, using the task manager process list, you can also close a non-responsive program. From the security aspect, any Virus, Spyware will show up in this list, so this is a very important tool that you can use when you feel you have a virus or a spyware installed on your computer. Sometimes you can directly say whether a process is running a virus or not, when you click on it, it will just 'slip' out of your mouse pointer and will change its position, these are the advanced viruses designed to evade from being manually removed. Antivirus Software Antivirus software is one of the first and foremost thing that you must install after getting a new system, or after you have re-installed your operating system. Choosing the right anti-virus software is very important; it is very much dependent how fast your computer is. An Antivirus constantly scans your system's active processes and is vigilant, so as to prevent any threats. With thousands of viruses releasing every day, here are some things to note - Prevention is better than cure, right? 1. Antivirus software priority - it should be the first thing you must install after getting a computer. 2. Never opt for 'Trial version', either purchase a full version, or use the free version with lesser features. The problem with trial version is, that once it is expired, it will stop protecting your system and trouble you with constant security alerts, which means, your computer is at risk while you are battling with security alerts.
  • 3. 3. Always keep your antivirus software updated, most of the antivirus softwares update automatically. However for some reason if they are not able to, update manually. So why does it needs to be updated? Companies that make these softwares release new virus Signatures or 'patterns' every week and in some cases even daily. The antivirus on your computer must learn about those new threats, so it downloads the new patterns from the server, while ensuring that you are protected from the latest viruses. Virus Sources There is no prime source of viruses, they can come up from just anywhere. However, here are some things you should be aware of - 1. EXE Files- Exe files are executable files that windows uses to execute or start any program, application or even a software. 2. Exe can contain viruses, even spyware designed to track your system, Always scan a file before opening it 3. Websites - Never accept a link from anyone whom you don't know. There are websites on the internet specially designed to compromise your computer, they may be in a form of internet chat, a forum, a game, or even music. 4. USB Flash Drives- we all share data, and use USB flash drives to carry our data with us. If you use your disk on an infected system, your disk will catch that virus, and will begin infecting every computer you insert it in. Always scan a USB flash drive before opening it. Firewall So what is a firewall? In simple terms, It is an application that is designed to control and analyze the network traffic coming in and out of your computer. It is like your pet dog that only allows certain people into your house, while preventing unauthorized people or intruders, at the same time alerting you at various occasions. So why is a firewall important? Everything that is in your computer needs to be protected. Your personal documents, photos, financial information, even your passwords. When your computer is connected to the internet, your data is susceptible to theft. Major corporations spend millions of dollars just on firewalls. According to a recent news report, Sony's Play Station was hacked, and a lot of data was leaked. This cost the company millions of dollars. Taking little bit of care about your computer security and escalating it, can be very beneficial. Does Windows have an in-built firewall? For starters, newer versions of windows like the windows 7, has an amazing inbuilt firewall, also known as the windows firewall, It allows granular control over your systems' networking, even defining rules for applications that are installed in your computer.
  • 4. Windows firewall also has different profiles like 'home network' and 'public network'. This allows easy one click configuration, wherein you change the settings depending on the location you are using. When you're connected to a public network like a library or a coffee shops' wireless network, you may want to block all incoming connections and can select the public network profile. At home or work, where you may be sharing files over the network, you can easily switch to the home network profile. You can access windows firewall by - clicking the Start button clicking Control Panel, clicking Security, and then clicking Windows Firewall. Make sure that your firewall is set to 'ON' For advanced users, you can even install a free third-party firewall like "Comodo Firewall". It is one of the most advanced, and free firewalls that I have encountered and the one I personally use. This is however not recommended for basic users, since its configuration requires a very good understanding of the windows operating systems and its architecture, and about TCP/IP. Security tips and tricks 1. Be cautious with your computer Administrator passwords, never store them anywhere, always memorize them, they are the key to your system. Someone who is trying to gain remote access to your system won't get through if he cannot guess your password. Try to include a combination of special characters, numbers and letters for your password. 2. Download softwares only from reputed websites, these include Cnet.com, FileHippo.com, Soft32.com. 3. These websites never host malicious softwares, and always scan them with an antivirus before hosting them. 4. Always scan your USB flash drives with your antivirus before opening it.Simply Right-click your disk in My computer, and select 'Scan with' - your antivirus 5. Run a full system scan every month. This will help removing any viruses that have crawled in. 6. Never turn off your anti-virus software or your firewall. Many a times people suggest turning them off. 7. If possible, get a security expert to analyze your computer once a month. A security expert will check your computer in great detail and will suggest you to remove any programs that may compromise your computer. 8. Windows update - Always use windows update and set it to automatic. Windows updates are critical system patches that escalate your system security or patch any vulnerability that was otherwise found by Microsoft security experts. Many people don't realize the significance of Windows Update,until they are infected. 9. User account control - User account control is a security feature in windows that should always be 'ON', it prevents the execution of malicious code. 10. Web Browser - Always update to a newer version of a web browser, they are better, faster and more secure. Because everything today is web-based, security of your web browser is the most important thing.
  • 5. 11. User Accounts - Always keep the guest account disabled, and create a new administrator account for yourself. Never use the default administrator account. These are the basic steps that you can use to secure your Windows computer.