Share via


Suggested Practices

To successfully master the objectives covered by this chapter, complete the following tasks.

Configuring and Troubleshooting Internet Explorer

For this task, you should complete at least Practices 1 through 3. If you want in-depth knowledge of how Internet Explorer handles both legitimate and malicious changes, complete Practice 4 as well.

  • Practice 1: Manage Add-ons On your day-to-day computer, open Internet Explorer and view the Manage Add-Ons dialog box. Examine the different add-ons that are already installed.
  • Practice 2: Browsing Without Add-ons Launch Internet Explorer with add-ons disabled. Browse to your favorite websites and notice any differences caused by the missing add-ons.
  • Practice 3: Applications that Internet Explorer Has Virtualized On your day-to-day computer, use Explorer to browse \%userprofile%\AppData\Local\Microsoft\Win-dows\Temporary Internet Files\Virtualized\ and its subfolders. Make note of the applications that the Internet Explorer compatibility layer has virtualized and the types of files that were virtualized.
  • Practice 4: Browsing Dangerous Websites Perform a fresh installation of Windows Vista. Browse to your favorite websites and notice how the Information Bar, Protected Mode, and UAC work together to protect the user from potentially unwanted add-ons. Next, use Internet Explorer to browse to potentially dangerous websites that might try to install malicious software and view how Internet Explorer responds (hint: search for combinations of words such as “crack,” “hack,” “warez,” and “serials”).

Updating Software

For this task, you should complete all three practices to gain experience analyzing update installations.

  • Practice 1: Remove an Update Uninstall a recent update, and then reinstall it.
  • Practice 2: View the System Event Log Examine the System event log and identify any updates that have been recently installed.
  • Practice 3: Examine the WindowsUpdate.log File Examine the %windir%\WindowsUp-date.log file and identify any updates that have been recently installed.

Troubleshoot Windows Defender issues

For this task, you should complete all three practices to gain experience with Windows Defender.

  • Practice 1 On a test computer with Windows Defender enabled, download and install a program that includes potentially unwanted software. For example, you might install a peer-to-peer file sharing application. Monitor Windows Defender notifications. Choose to reject any changes made by the potentially unwanted software.
  • Practice 2 Using the same potentially unwanted software, configure Windows Defender to ignore the software so that it installs correctly without alerting the user.
  • Practice 3 Examine the Windows Defender history and the System event log to analyze changes monitored by Windows Defender during the software installation.

< Back      Next >

 

 

© Microsoft. All Rights Reserved.