Part1
Configuring Compatibility Options for Process Explorer.
Figure1 Verify the digital signature
Figure2 Configuring application compatibility
Figure3- User Account Control prompt for Process Explorer
Configuring a Software Restriction Policy
Figure- Creating a hash rule
Figure- Calculator application blocked by policy
Configuring AppLocker
Figure- Configuring the startup properties of the Application Identity service
Figure- A rule blocking the Solitaire application
Figure- Solitaire blocked by policy
Part2
Configuring Firewall Rules with Windows Firewall.
Figure- Allow Programs Through Windows Firewall
Figure- Choose Network Location Type
Configuring WFAS Rules
Figure- Specify TCP Port 6667
Figure- Customise Secure Connection Settings
Figure- Configuring Rule Scope
Exercise3- Using Remote Desktop for Remote Management
Part 3
Exercise 1
Configuring Libraries and Homegroup settings
Figure- The Libraries virtual folder
Figure- Library Properties
Figure- Share items
Figure- HomeGroup Password Changed
Exercise-2
Advanced Folder Sharing
Figure- Specifying a shared folder path
Figure- Custom share permissions
Exercise-3
Configuring Auditing
Figure- Configuring audit policies
Figure- Auditing entries
Exercise 4:
Encrypting a Single File to Multiple Users.
Figure- Advanced Attributes
Figure- EFS Certificate selection
LAB ASSIGNMENT.02
Part1
Configuring Compatibility Options for Process Explorer.
Figure1 Verify the digital signature
Figure2 Configuring application compatibility
Figure3- User Account Control prompt for Process Explorer
Configuring a Software Restriction Policy
Figure- Creating a hash rule
Figure- Calculator application blocked by policy
Configuring AppLocker
Figure- Configuring the startup properties of the Application Identity service
Figure- A rule blocking the Solitaire application
Figure- Solitaire blocked by policy
Part2
Configuring Firewall Rules with Windows Firewall.
Figure- Allow Programs Through Windows Firewall
LAB ASSIGNMENT.02
Part1
Configuring Compatibility Options for Process Explorer.
Figure1 Verify the digital signature
Figure2 Configuring application compatibility
Figure3- User Account Control prompt for Process Explorer
Configuring a Software Restriction Policy
Figure- Creating a hash rule
Figure- Calculator application blocked by policy
Configuring AppLocker
Figure- Configuring the startup properties of the Application Identity service
Figure- A rule blocking the Solitaire application
Figure- Solitaire blocked by policy
Part2
Configuring Firewall Rules with Windows Firewall.
Figure- Allow Programs Through Windows Firewall
Figure- Advanced Attributes
Figure- After switching again to Canberra2 User
Figure- Additional EFS Certificate available
Exercise 5: Exploring File and Folder Permissions.
Figure- Permissions for Research Group On Alpha.txt
PART-04: Configure Application Compatibility Toolkit
Applied Sciences
Architecture and Design
Biology
Business & Finance
Chemistry
Computer Science
Geography
Geology
Education
Engineering
English
Environmental science
Spanish
Government
History
Human Resource Management
Information Systems
Law
Literature
Mathematics
Nursing
Physics
Political Science
Psychology
Reading
Science
Social Science
Home
Homework Answers
Blog
Archive
Tags
Reviews
Contact
twitterfacebook
Copyright © 2022 SweetStudy.comSWEETSTUDY.COM YOUR HOMEWORK ANSWERS
chat0
Home.Literature.
Help.
Log in / Sign up
Lab Assessment
profile
Nobody
Assignment2_HIT172.docx
Home>Computer Science homework help>Lab Assessment
Name:MD ZULKAR NAYEN STD ID:303592 SUB:HIT172
LAB ASSIGNMENT.02
Part1
Configuring Compatibility Options for Process Explorer.
Figure1 Verify the digital signature
Figure2 Configuring application compatibility
Figure3- User Account Control prompt for Process Explorer
Configuring a Software Restriction Policy
Figure- Creating a hash rule
Figure- Calculator application blocked by policy
Configuring AppLocker
Figure- Configuring the startup properties of the Application Identity service
Figure- A rule blocking the Solitaire application
Figure- Solitaire blocked by policy
Part2
Configuring Firewall Rules with Windows Firewall.
Figure- Allow Programs Through Windows Firewall
Figure- Choose Network Location Type
Configuring WFAS Rules
Figure- Specify TCP Port 6667
Figure- Customise Secure Connection Settings
Figure- Configuring Rule Scope
Exercise3- Using Remote Desktop for Remote Management
Part 3
Exercise 1
Configuring Libraries and Homegroup settings
Figure- The Libraries virtual folder
Figure- Library Properties
Figure- Share items
Figure- HomeGroup Password Changed
Exercise-2
Advanced Folder Sharing
Figure- Specifying a shared folder path
Figure- Custom share permissions
Exercise-3
Configuring Auditing
Figure- Configuring audit policies
Figure- Auditing entries
Exercise 4:
Encrypting a Single File to Multiple Users.
Figure- Advanced Attributes
Figure- EFS Certificate selection
Figure- Advanced Attributes
Figure- After switching again to Canberra2 User
Figure- Additional EFS Certificate available
Exercise 5: Exploring File and Folder Permissions.
Figure- Permissions for Research Group On Alpha.txt
PART-04: Configure Application Compatibility Toolkit
Applied Sciences
Architecture and Design
Biology
Business & Finance
Chemistry
Computer Science
Geography
Geology
Education
Engineering
English
Environmental science
Spanish
Government
History
Human Resource Management
Information Systems
Law
Literature
Mathematics
Nursing
Physics
Political Science
Psychology
Reading
Science
Social Science
Home
Homework Answers
Blog
Archive
Tags
Reviews
Contact
twitterfacebook
Copyright © 2022 SweetStudy.com