Upgrade to remove ads
EXAM 70-687 Configuring Windows 8 - Lesson 7
LESSON 7 - KEYTERMS
Terms in this set (12)
application control policies
uses rules, which administrators must manage, but the process of creating the rules is much easier. thanks to a wizard-based interface.
also known as application control policies
Identify applications based on the inclusion of a certificate signed by the software publisher. An the executable file is updated, as long as the certificate remains valid.application can continue to match this type of rule, even if
applies when an application does not match any of the other rules you have created.
Contains rules that apply to files with .exe and .com extensions
Identify applications based on a digital fingerprint that remains valid even when the name or location of the executable file changes.
network zone rules
Identify Windows Installer (.msi) packages downloaded with Internet Explorer based on the securiry zone of the site from which they are downloaded.
packaged app rules
Contains rules that apply to applications purchased through the Windows Store.
Identify applications by specifying a file or folder name or a registry key The potential vulnerabiliry of this type of rule is that any file can match the rule, as long as it is the correct name or location.
Contains rules that apply to script files with .psl , .bae, .cmd, .vbs, and .js extensions
software restriction policies
Group Policy settings that enable administrators to specify the programs that are allowed to run on workstations by creating rules of various types.
Windows Installer rules
Contains rules that apply to Windows Installer packages with .msi and .msp extensions.
THIS SET IS OFTEN IN FOLDERS WITH...
EXAM 70-687 Configuring Windows 8 - Lesson 8
EXAM 70-687 Configuring Windows 8 - Lesson 6
EXAM 70-687 Configuring Windows 8 - Lesson 9
EXAM 70-687 Configuring Windows 8 - Lesson 10
YOU MIGHT ALSO LIKE...
Chapter 18 Install/Config windows server2012
Ch 18 windows server
Windows 10 Chapter 6
OTHER SETS BY THIS CREATOR
EXAM 70-687 Configuring Windows 8 - Lesson 18
EXAM 70-687 Configuring Windows 8 - Lesson 17
Ethical Hacking and Network Security - Ch 13 - Net…
Ethical Hacking and Security - Chapter 12 - Crypto…