Explore Microsoft Windows 10 operating system

Identify the Windows 10 editions

Baseline editions

Organizational editions

Device-specific editions

Home

Pro

Pro for Workstation

Education

Pro Education

Enterprise

Enterprise LTSC

Holographic

IoT Enterprise

Team

Differentiate between

Windows 10 32 bits

Windows 10 64 bits

can ideally access about 232 memory addresses

can access about 264 memory addresses

can handle any amount of memory that is greater than 4 GB easily.

equal to 18 Quintillion Bytes of physical memory or RAM

equal to 4 GB (gigabytes) of physical memory or RAM

can also access more than 4 GB of physical memory, but not very efficiently

Install Windows 10 on a computer

Manage the Windows 10 Desktop

Taskbar
image

Taskbar
image

Windows Explorer
image

Hiding picture and photo names
Screenshot 2023-11-19 203257

Switching between Windows
image

Manage data security: create partition & move data

Describe the security of Windows 10 with other Windows previous products

Explain security in Microsoft Windows 10 operating system

User Account Control (UAC)

Firewall

Windows Defender

Windows Update

Regular patches and fixes

Address security vulnerabilities and bugs

Controls incoming and outgoing network traffic

Blocks unauthorized access to your system

Built-in antivirus software

Real-time protection against
viruses, malware, and spyware

UAC prompts for user permission for system changes

Prevents unauthorized alterations

Windows 10 Security

Previous products

Windows 7

Windows 8

Windows XP

Windows Vista

Basic antivirus, BitLocker

Secure Boot, some security enhancements

UAC, initial security improvements

Limited security measures, vulnerable

Windows Defender

BitLocker

Windows Hello

Windows Information Protection (WIP)

Windows Updates

Device Guard

Trusted app execution

Biometric authentication

Enhanced antivirus

Improved data encryption

Frequent security patches

Data segregation

Use the utilities program that compatible with Windows10

Windows Firewall


Anti-virus Software

Real-time protection

Windows Defender


User Account Control (UAC)


Scheduled scans

Malware detection and removal

Inbound and outbound traffic control

Program-specific rules

Advanced security settings

Real-time protection

Automatic updates

Cloud-based threat detection

Prompt for administrator approval

Notification of changes to the system settings

Adjustable security levels

click to edit

Explore the need of Windows Update


Security

Protects against threats and vulnerabilities

Stability

Compatibility

Features

Performance

Compliance

User Experience

Data Protection

Fixes bugs for a smoother experience.

Ensures support for new software and hardware.

Introduces new functionalities and optimizations.

Improves system efficiency.

Meets legal and regulatory requirements.

Enhances interface and usability.

Addresses privacy and security concerns.

Configure the various elements in Advanced Firewall.


Open Windows Firewall with Advanced Security:


Press the Windows key + S to open the search bar.

Type "Windows Firewall with Advanced Security" and select it from the results.

Overview of Advanced Security:


You will see three main nodes on the left: Inbound Rules, Outbound Rules, and Connection Security Rules.

Rule Types:

Inbound: Traffic coming in.
Outbound: Traffic going out.

Create a Rule:


Right-click on Inbound Rules or Outbound Rules, choose New Rule, and follow the wizard.

Connection Security Rules:


Used for advanced network setups.

Monitoring and Logging:


Check activity under Monitoring and enable logging for details.

Advanced Settings:


-Right-click on the main window, go to Properties.
-Configure profiles, IPsec, and notifications.

Rule Order:

Adjust rule order for priority.

Action

Right-click on a rule, go to Properties, and choose Allow or Block.

Apply Changes:


Click OK to save changes.