Suggested Practices

To successfully master the objectives covered by this chapter, complete the following tasks.

Configuring and Troubleshooting Internet Explorer

For this task, you should complete at least Practices 1 through 3. If you want in-depth knowledge of how Internet Explorer handles both legitimate and malicious changes, complete Practice 4 as well.

  • Practice 1: Manage Add-ons On your day-to-day computer, open Internet Explorer and view the Manage Add-Ons dialog box. Examine the different add-ons that are already installed.
  • Practice 2: Browsing Without Add-ons Launch Internet Explorer with add-ons disabled. Browse to your favorite websites and notice any differences caused by the missing add-ons.
  • Practice 3: Applications that Internet Explorer Has Virtualized On your day-to-day computer, use Explorer to browse \%userprofile%\AppData\Local\Microsoft\Win-dows\Temporary Internet Files\Virtualized\ and its subfolders. Make note of the applications that the Internet Explorer compatibility layer has virtualized and the types of files that were virtualized.
  • Practice 4: Browsing Dangerous Websites Perform a fresh installation of Windows Vista. Browse to your favorite websites and notice how the Information Bar, Protected Mode, and UAC work together to protect the user from potentially unwanted add-ons. Next, use Internet Explorer to browse to potentially dangerous websites that might try to install malicious software and view how Internet Explorer responds (hint: search for combinations of words such as “crack,” “hack,” “warez,” and “serials”).

Updating Software

For this task, you should complete all three practices to gain experience analyzing update installations.

  • Practice 1: Remove an Update Uninstall a recent update, and then reinstall it.
  • Practice 2: View the System Event Log Examine the System event log and identify any updates that have been recently installed.
  • Practice 3: Examine the WindowsUpdate.log File Examine the %windir%\WindowsUp-date.log file and identify any updates that have been recently installed.

Troubleshoot Windows Defender issues

For this task, you should complete all three practices to gain experience with Windows Defender.

  • Practice 1 On a test computer with Windows Defender enabled, download and install a program that includes potentially unwanted software. For example, you might install a peer-to-peer file sharing application. Monitor Windows Defender notifications. Choose to reject any changes made by the potentially unwanted software.
  • Practice 2 Using the same potentially unwanted software, configure Windows Defender to ignore the software so that it installs correctly without alerting the user.
  • Practice 3 Examine the Windows Defender history and the System event log to analyze changes monitored by Windows Defender during the software installation.

< Back      Next >

 

 

© Microsoft. All Rights Reserved.