SlideShare a Scribd company logo
Maintaining, Updating, and ProtectingMaintaining, Updating, and Protecting
Upgrading Windows 7Upgrading Windows 7
Lesson 7
ObjectivesObjectives
Objective Domain Matrix
Technology Skill Objective Domain Description Objective Domain
Number
Understanding Disk Defragmenter Understanding Disk Defragmenter 6.2.1
Understanding Disk Cleanup Understanding Disk Cleanup 6.2.2
Understanding Task Scheduler Understanding Task Scheduler 6.2.3
Understanding Action Center Understanding Action Center 6.2.4
Understanding System Information Understanding System Information 6.2.5
Understanding the Windows Registry Understanding the Windows Registry 3.3.4
Understanding Windows Updates Understanding Windows Updates 6.3.1
Understanding Microsoft Updates Understanding Microsoft Updates 6.3.2
Understanding Hotfixes Understanding Hotfixes 6.3.3
Understanding Action Center Understanding Action Center 3.3.2
Understanding Windows Defender Understanding Windows Defender 3.3.1
Using the Malicious Software Removal Tool Using the Malicious Software Removal Tool 3.3.3
Understanding Windows Forefront Endpoint
Protection
Understanding Windows Forefront Endpoint
Protection
3.3.5
Disk DefragmenterDisk Defragmenter
• A utility that helps improve a computer’s
performance by moving sectors of data on
the hard disk, so that files are stored
sequentially
• Minimizes the movement a hard disk’s arm
must make to read all of the sectors that
make up a file or program
• Set to automatically run once a week
Disk DefragmenterDisk Defragmenter
Disk CleanupDisk Cleanup
• Helps users remove unnecessary files from
their computers:
– Downloaded program files
– Temporary Internet files
– Offline Web pages
– Files left after running software
– More
Disk CleanupDisk Cleanup
Task SchedulerTask Scheduler
• Enables a user to schedule and automate a
variety of actions, such starting programs,
displaying messages, and even sending e-
mails
• Tasks scheduled by specifying a trigger,
which is an event that causes a task to run,
and an action, which is the action taken
when the task runs
• Two primary task-creating commands:
Create Basic Task and Create Task
Creating Basic TasksCreating Basic Tasks
Creating Basic TasksCreating Basic Tasks
Creating Basic TasksCreating Basic Tasks
Creating Basic TasksCreating Basic Tasks
Creating Basic TasksCreating Basic Tasks
Creating Basic TasksCreating Basic Tasks
Creating Basic TasksCreating Basic Tasks
Creating Basic TasksCreating Basic Tasks
Creating TasksCreating Tasks
Creating TasksCreating Tasks
Creating TasksCreating Tasks
Creating TasksCreating Tasks
Creating TasksCreating Tasks
Action CenterAction Center
Action CenterAction Center
System InformationSystem Information
• Displays a wealth of information about a
computer’s hardware, drivers, and system
software
• Check System Information for possible clues
as to the source of system-related issues
System InformationSystem Information
System InformationSystem Information
Windows RegistryWindows Registry
Key
Subkey
Values
Windows UpdateWindows Update
Windows UpdateWindows Update
Important UpdatesImportant Updates
Optional UpdatesOptional Updates
Windows Update HistoryWindows Update History
Action Center Security SectionAction Center Security Section
Windows FirewallWindows Firewall
Allowing Programs through Windows FirewallAllowing Programs through Windows Firewall
Windows DefenderWindows Defender
Windows Defender Default ActionsWindows Defender Default Actions
Windows Defender Advanced OptionsWindows Defender Advanced Options
Microsoft Security EssentialsMicrosoft Security Essentials
Microsoft Windows Malicious SoftwareMicrosoft Windows Malicious Software
Removal ToolRemoval Tool
Microsoft Forefront Endpoint ProtectionMicrosoft Forefront Endpoint Protection
• Antivirus/anti-malware and management
software for desktops, laptops, and other
client endpoints in a business environment
• Designed for environments with more than
10 client computers
• Built on System Center Configuration
Manager
– Provides centralized management and
security of client computers; supports WSUS
Microsoft Forefront Endpoint ProtectionMicrosoft Forefront Endpoint Protection
SummarySummary
• Disk Defragmenter can speed up your computer’s
performance by defragmenting data on your hard
disk.
• Disk Cleanup helps you remove unnecessary files
from your computer.
• Task Scheduler enables you to automate tasks that
don’t have scheduling features built in.
• Windows 7 Action Center tracks maintenance and
security utilities, issues, and so on.
SummarySummary
• System Information displays a wealth of
information about your computer’s hardware,
drivers, and system software.
• The Windows Registry is a database of
configuration settings for your computer.
• Windows Update and Microsoft Update are the
primary update tools for Windows 7.
• Windows Firewall is the native firewall in Windows
7 and many other versions of Windows.
SummarySummary
• Windows Defender is a free program that protects
your computer from spyware.
• Microsoft Security Essentials provides real-time
protection from viruses and other malware.
• If your anti-malware software cannot remove a
virus or worm from a computer, try the Microsoft
Windows Malicious Software Removal Tool.
• Microsoft Forefront Endpoint Protection works with
System Center Configuration Manager 2007 to
provide security for network-connected computers
in the enterprise.

More Related Content

What's hot

Configuring Devices in Windows
Configuring Devices in WindowsConfiguring Devices in Windows
Configuring Devices in Windows
Amir Villas
 
Working with Applications
Working with ApplicationsWorking with Applications
Working with Applications
Amir Villas
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and Application
Vichhaiy Serey
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating System
Amir Villas
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
OriginalGSM
 
Chapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility ProgramsChapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility Programs
norzaini
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5
rohassanie
 
Windows Xp Optimization
Windows Xp OptimizationWindows Xp Optimization
Windows Xp Optimization
Shan Sachwani
 
The operating system (os),
The operating system (os),The operating system (os),
The operating system (os),
emesce
 
Ch1 2
Ch1 2Ch1 2
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
Rohan Bhatkar
 
The Boot Process
The Boot ProcessThe Boot Process
The Boot Process
Amir Villas
 
Fundamental
FundamentalFundamental
Fundamental
MAQ Institute
 
Utility Program
Utility ProgramUtility Program
Utility Program
Umar Daraz
 
Utility Programs
Utility ProgramsUtility Programs
Utility Programs
Aasim Mushtaq
 
Week 6
Week 6Week 6
Week 6
Joey Pierce
 
CSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerCSS L07 - Preparing the Installer
CSS L07 - Preparing the Installer
Marvin Bronoso
 
Using a Windows Network
Using a Windows NetworkUsing a Windows Network
Using a Windows Network
Amir Villas
 
1 5 system software and computer management
1 5 system software and computer management1 5 system software and computer management
1 5 system software and computer management
QondileRamokgadi
 
features of windows7 & 8(trail)
features of windows7 & 8(trail)features of windows7 & 8(trail)
features of windows7 & 8(trail)
ava & araf co.
 

What's hot (20)

Configuring Devices in Windows
Configuring Devices in WindowsConfiguring Devices in Windows
Configuring Devices in Windows
 
Working with Applications
Working with ApplicationsWorking with Applications
Working with Applications
 
Introduction, Installation Operating System and Application
Introduction, Installation Operating System and ApplicationIntroduction, Installation Operating System and Application
Introduction, Installation Operating System and Application
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating System
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
Chapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility ProgramsChapter 8 Operating Systems And Utility Programs
Chapter 8 Operating Systems And Utility Programs
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5
 
Windows Xp Optimization
Windows Xp OptimizationWindows Xp Optimization
Windows Xp Optimization
 
The operating system (os),
The operating system (os),The operating system (os),
The operating system (os),
 
Ch1 2
Ch1 2Ch1 2
Ch1 2
 
Operating system windows XP
Operating system windows XPOperating system windows XP
Operating system windows XP
 
The Boot Process
The Boot ProcessThe Boot Process
The Boot Process
 
Fundamental
FundamentalFundamental
Fundamental
 
Utility Program
Utility ProgramUtility Program
Utility Program
 
Utility Programs
Utility ProgramsUtility Programs
Utility Programs
 
Week 6
Week 6Week 6
Week 6
 
CSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerCSS L07 - Preparing the Installer
CSS L07 - Preparing the Installer
 
Using a Windows Network
Using a Windows NetworkUsing a Windows Network
Using a Windows Network
 
1 5 system software and computer management
1 5 system software and computer management1 5 system software and computer management
1 5 system software and computer management
 
features of windows7 & 8(trail)
features of windows7 & 8(trail)features of windows7 & 8(trail)
features of windows7 & 8(trail)
 

Viewers also liked

Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print Sharing
Gene Carboni
 
Ch05
Ch05Ch05
Introduction to Hardware
Introduction to HardwareIntroduction to Hardware
Introduction to Hardware
Gene Carboni
 
PC Hardware Servicing Hand Out 2
PC Hardware Servicing Hand Out 2PC Hardware Servicing Hand Out 2
PC Hardware Servicing Hand Out 2
Laguna State Polytechnic University
 
Fast track to troubleshooting your pc
Fast track to troubleshooting your pcFast track to troubleshooting your pc
Fast track to troubleshooting your pc
Mik Endale
 
PC Hardware Servicing Hand Out 1
PC Hardware Servicing Hand Out 1PC Hardware Servicing Hand Out 1
PC Hardware Servicing Hand Out 1
Laguna State Polytechnic University
 
MICROSOFT POWERPOINT 2013 " SLIDE LAYOUT "
MICROSOFT POWERPOINT 2013 " SLIDE LAYOUT "MICROSOFT POWERPOINT 2013 " SLIDE LAYOUT "
MICROSOFT POWERPOINT 2013 " SLIDE LAYOUT "
Joshua Panambitan
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7
Gene Carboni
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing Disks
Gene Carboni
 
7th ed ppt ch07
7th ed ppt ch077th ed ppt ch07
7th ed ppt ch07
Gene Carboni
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
Gene Carboni
 
Computer repair -_a_complete_illustrated_guide_to_pc_hardware
Computer repair -_a_complete_illustrated_guide_to_pc_hardwareComputer repair -_a_complete_illustrated_guide_to_pc_hardware
Computer repair -_a_complete_illustrated_guide_to_pc_hardware
Shripal Oswal
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7
Gene Carboni
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
Gene Carboni
 
Ojt narrative report - an example
Ojt  narrative report - an exampleOjt  narrative report - an example
Ojt narrative report - an example
Enzo Engada
 
File sharing ppt
File sharing pptFile sharing ppt
File sharing ppt
Jes Lubiano
 
Chs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningChs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioning
Adolfo Nasol
 
Narrative report in ojt
Narrative report in ojtNarrative report in ojt
Narrative report in ojt
Fate Capa
 

Viewers also liked (18)

Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print Sharing
 
Ch05
Ch05Ch05
Ch05
 
Introduction to Hardware
Introduction to HardwareIntroduction to Hardware
Introduction to Hardware
 
PC Hardware Servicing Hand Out 2
PC Hardware Servicing Hand Out 2PC Hardware Servicing Hand Out 2
PC Hardware Servicing Hand Out 2
 
Fast track to troubleshooting your pc
Fast track to troubleshooting your pcFast track to troubleshooting your pc
Fast track to troubleshooting your pc
 
PC Hardware Servicing Hand Out 1
PC Hardware Servicing Hand Out 1PC Hardware Servicing Hand Out 1
PC Hardware Servicing Hand Out 1
 
MICROSOFT POWERPOINT 2013 " SLIDE LAYOUT "
MICROSOFT POWERPOINT 2013 " SLIDE LAYOUT "MICROSOFT POWERPOINT 2013 " SLIDE LAYOUT "
MICROSOFT POWERPOINT 2013 " SLIDE LAYOUT "
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing Disks
 
7th ed ppt ch07
7th ed ppt ch077th ed ppt ch07
7th ed ppt ch07
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
 
Computer repair -_a_complete_illustrated_guide_to_pc_hardware
Computer repair -_a_complete_illustrated_guide_to_pc_hardwareComputer repair -_a_complete_illustrated_guide_to_pc_hardware
Computer repair -_a_complete_illustrated_guide_to_pc_hardware
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
 
Ojt narrative report - an example
Ojt  narrative report - an exampleOjt  narrative report - an example
Ojt narrative report - an example
 
File sharing ppt
File sharing pptFile sharing ppt
File sharing ppt
 
Chs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningChs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioning
 
Narrative report in ojt
Narrative report in ojtNarrative report in ojt
Narrative report in ojt
 

Similar to Lesson 7 - Maintaining, Updating, and Protecting

Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff Stokes
Jeff Stokes
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
ella dimaiwat
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
PoornimaGhodke3
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
OriginalGSM
 
Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptx
LINDYLGERAL
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
Duressa Teshome
 
PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018
Fizaril Amzari Omar
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
shaikmohammedsalman
 
categories of computer software
categories of computer softwarecategories of computer software
categories of computer software
Manidhar Chowdary
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Jeff Stokes
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
Keith Combs
 
UNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.pptUNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.ppt
JohnReyBoaquia2
 
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
Fizaril Amzari Omar
 
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docxModern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
raju957290
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_Battlecard
Larry Yurdin
 
Hirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 pptHirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 ppt
Suman Sudheer
 
John
JohnJohn
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
Kamal Acharya
 
Lecture 2.6 software
Lecture 2.6 softwareLecture 2.6 software
Lecture 2.6 software
KMJ Science Computer
 
Returnil 2010
Returnil 2010Returnil 2010
Returnil 2010
Rose Banioki
 

Similar to Lesson 7 - Maintaining, Updating, and Protecting (20)

Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff Stokes
 
Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)Information Computer Technology Handouts (Part I)
Information Computer Technology Handouts (Part I)
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptx
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
 
categories of computer software
categories of computer softwarecategories of computer software
categories of computer software
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
UNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.pptUNIT I-Computer Operation-Fundamentals.ppt
UNIT I-Computer Operation-Fundamentals.ppt
 
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
 
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docxModern Personal ComputerBoot up ProcessThe boot up process i.docx
Modern Personal ComputerBoot up ProcessThe boot up process i.docx
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_Battlecard
 
Hirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 pptHirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 ppt
 
John
JohnJohn
John
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Lecture 2.6 software
Lecture 2.6 softwareLecture 2.6 software
Lecture 2.6 software
 
Returnil 2010
Returnil 2010Returnil 2010
Returnil 2010
 

More from Gene Carboni

CarboniGoogleTrainerResume
CarboniGoogleTrainerResumeCarboniGoogleTrainerResume
CarboniGoogleTrainerResume
Gene Carboni
 
Chapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessChapter 3 - The Adjusting Process
Chapter 3 - The Adjusting Process
Gene Carboni
 
CHAPTER 3 Measuring Business Income: The Adjusting Process
CHAPTER 3  Measuring Business Income:  The Adjusting ProcessCHAPTER 3  Measuring Business Income:  The Adjusting Process
CHAPTER 3 Measuring Business Income: The Adjusting Process
Gene Carboni
 
CHAPTER 2 Recording Business Transactions
CHAPTER 2  Recording Business TransactionsCHAPTER 2  Recording Business Transactions
CHAPTER 2 Recording Business Transactions
Gene Carboni
 
CHAPTER 1 Accounting and the Business Environment
CHAPTER 1  Accounting and the Business EnvironmentCHAPTER 1  Accounting and the Business Environment
CHAPTER 1 Accounting and the Business Environment
Gene Carboni
 
Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7
Gene Carboni
 
Accounting - Chapter 1
Accounting - Chapter 1Accounting - Chapter 1
Accounting - Chapter 1
Gene Carboni
 
7th ed ppt ch10
7th ed ppt ch107th ed ppt ch10
7th ed ppt ch10
Gene Carboni
 
7th ed ppt ch09
7th ed ppt ch097th ed ppt ch09
7th ed ppt ch09
Gene Carboni
 
7th ed ppt ch08
7th ed ppt ch087th ed ppt ch08
7th ed ppt ch08
Gene Carboni
 
7th ed ppt ch06
7th ed ppt ch067th ed ppt ch06
7th ed ppt ch06
Gene Carboni
 
7th ed ppt ch05
7th ed ppt ch057th ed ppt ch05
7th ed ppt ch05
Gene Carboni
 
7th ed ppt ch04
7th ed ppt ch047th ed ppt ch04
7th ed ppt ch04
Gene Carboni
 
7th ed ppt ch03
7th ed ppt ch037th ed ppt ch03
7th ed ppt ch03
Gene Carboni
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Gene Carboni
 
7th ed ppt ch22
7th ed ppt ch227th ed ppt ch22
7th ed ppt ch22
Gene Carboni
 

More from Gene Carboni (16)

CarboniGoogleTrainerResume
CarboniGoogleTrainerResumeCarboniGoogleTrainerResume
CarboniGoogleTrainerResume
 
Chapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessChapter 3 - The Adjusting Process
Chapter 3 - The Adjusting Process
 
CHAPTER 3 Measuring Business Income: The Adjusting Process
CHAPTER 3  Measuring Business Income:  The Adjusting ProcessCHAPTER 3  Measuring Business Income:  The Adjusting Process
CHAPTER 3 Measuring Business Income: The Adjusting Process
 
CHAPTER 2 Recording Business Transactions
CHAPTER 2  Recording Business TransactionsCHAPTER 2  Recording Business Transactions
CHAPTER 2 Recording Business Transactions
 
CHAPTER 1 Accounting and the Business Environment
CHAPTER 1  Accounting and the Business EnvironmentCHAPTER 1  Accounting and the Business Environment
CHAPTER 1 Accounting and the Business Environment
 
Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7
 
Accounting - Chapter 1
Accounting - Chapter 1Accounting - Chapter 1
Accounting - Chapter 1
 
7th ed ppt ch10
7th ed ppt ch107th ed ppt ch10
7th ed ppt ch10
 
7th ed ppt ch09
7th ed ppt ch097th ed ppt ch09
7th ed ppt ch09
 
7th ed ppt ch08
7th ed ppt ch087th ed ppt ch08
7th ed ppt ch08
 
7th ed ppt ch06
7th ed ppt ch067th ed ppt ch06
7th ed ppt ch06
 
7th ed ppt ch05
7th ed ppt ch057th ed ppt ch05
7th ed ppt ch05
 
7th ed ppt ch04
7th ed ppt ch047th ed ppt ch04
7th ed ppt ch04
 
7th ed ppt ch03
7th ed ppt ch037th ed ppt ch03
7th ed ppt ch03
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
7th ed ppt ch22
7th ed ppt ch227th ed ppt ch22
7th ed ppt ch22
 

Recently uploaded

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 

Recently uploaded (20)

Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 

Lesson 7 - Maintaining, Updating, and Protecting

Editor's Notes

  1. There are two commands in the Task Scheduler Actions pane for creating tasks: Create Basic Task and Create Task. When you use the Create Basic Task command, the Create Basic Task Wizard walks you through the essentials of creating a task. The Create Task command displays the Create Task dialog box, which is the manual way of creating a task but gives you more control and options.
  2. Enables you to view the status of security features (firewall, antivirus software, etc.) and maintenance. Windows 7 notifies you of any pending issues by displaying a red X under the flag in the notification area.
  3. The Maintenance section tracks solutions to problem reports, and the status of backups, Windows Update, and troubleshooting issues.
  4. You can export information from System Information to a text file to send to a fellow support technician or post on a troubleshooting forum on a Web site. System Information enables you to save information to an .nfo file format, which you can open from System Information, or export information to a standard text file with a .txt file extension.
  5. Administrators in all but very small environments often use Windows Server Update Services (WSUS) to gather Windows updates and hotfixes and then distribute them to client computers.
  6. Administrators in all but very small environments often use Windows Server Update Services (WSUS) to gather Windows updates and hotfixes and then distribute them to client computers.
  7. Administrators in all but very small environments often use Windows Server Update Services (WSUS) to gather Windows updates and hotfixes and then distribute them to client computers.
  8. Administrators in all but very small environments often use Windows Server Update Services (WSUS) to gather Windows updates and hotfixes and then distribute them to client computers.
  9. Administrators in all but very small environments often use Windows Server Update Services (WSUS) to gather Windows updates and hotfixes and then distribute them to client computers.
  10. The Action Center Security section tracks the computer’s firewall, antispyware software, and antivirus software, in addition to Windows Update, Internet security settings, User Account Control, and Network Access Protection (NAP).
  11. Firewalls sometimes block good programs. You can use the Allow a program or feature through Windows Firewall command in the task pane of the Windows Firewall page to allow good programs to communicate through the firewall.
  12. Spyware is a type of program that installs on your computer without your permission, monitors your computing activities, and reports the activity back to the spyware writer or a third party. Some legitimate companies use spyware to gather profile information about their customers for their direct marketing and product development efforts; however, most spyware is malicious in nature. Windows Defender is a free Microsoft antispyware program. It runs in the background, constantly monitoring a computer for spyware. When it detects spyware, the program quarantines it (so the spyware can't run on the computer) or deletes it. You can also run quick, full, and custom scans from Windows Defender.
  13. You can set default behaviors when Windows Defender detects a severe, high, medium, or low alert item. All options in the drop-down lists include the choice to Quarantine or to Remove . The medium and low alert levels also include the Allow option.
  14. Microsoft Security Essentials is a program that helps protect a computer from viruses and other malware. You can run Microsoft Security Essentials for free on up to 10 computers. Microsoft recommends that you use Microsoft Forefront Endpoint Protection (covered later in the lesson). Like Windows Defender, Security Essentials offers three types of scans: quick, full, and custom. Microsoft Security Essentials is updated regularly by the Microsoft Update service to ensure the signatures, the anti-malware engine, and the application itself are kept up to date. A signature is a sequence of text or code that’s programmed into a virus and uniquely identifies it. An anti-malware engine is the search process antivirus software uses to find viruses and other malware on a computer. Because new threats appear every day, Security Essentials downloads new signatures daily and uses the Dynamic Signature Service to push the updates to your computer almost immediately.
  15. Scans a computer for dangerous malware and attempts to remove it immediately. It’s useful for removing malware that you know is on your system but can’t be removed by other anti-malware software. The tool is available as a free download from the Microsoft Web site.