Explore Microsoft Windows 10 operating system
Identify the Windows 10 editions
Baseline editions
Organizational editions
Device-specific editions
Home
Pro
Pro for Workstation
Education
Pro Education
Enterprise
Enterprise LTSC
Holographic
IoT Enterprise
Team
Differentiate between
Windows 10 32 bits
Windows 10 64 bits
can ideally access about 232 memory addresses
can access about 264 memory addresses
can handle any amount of memory that is greater than 4 GB easily.
equal to 18 Quintillion Bytes of physical memory or RAM
equal to 4 GB (gigabytes) of physical memory or RAM
can also access more than 4 GB of physical memory, but not very efficiently
Install Windows 10 on a computer
Manage the Windows 10 Desktop
Taskbar
Taskbar
Windows Explorer
Hiding picture and photo names
Switching between Windows
Manage data security: create partition & move data
Describe the security of Windows 10 with other Windows previous products
Explain security in Microsoft Windows 10 operating system
User Account Control (UAC)
Firewall
Windows Defender
Windows Update
Regular patches and fixes
Address security vulnerabilities and bugs
Controls incoming and outgoing network traffic
Blocks unauthorized access to your system
Built-in antivirus software
Real-time protection against
viruses, malware, and spyware
UAC prompts for user permission for system changes
Prevents unauthorized alterations
Windows 10 Security
Previous products
Windows 7
Windows 8
Windows XP
Windows Vista
Basic antivirus, BitLocker
Secure Boot, some security enhancements
UAC, initial security improvements
Limited security measures, vulnerable
Windows Defender
BitLocker
Windows Hello
Windows Information Protection (WIP)
Windows Updates
Device Guard
Trusted app execution
Biometric authentication
Enhanced antivirus
Improved data encryption
Frequent security patches
Data segregation
Use the utilities program that compatible with Windows10
Windows Firewall
Anti-virus Software
Real-time protection
Windows Defender
User Account Control (UAC)
Scheduled scans
Malware detection and removal
Inbound and outbound traffic control
Program-specific rules
Advanced security settings
Real-time protection
Automatic updates
Cloud-based threat detection
Prompt for administrator approval
Notification of changes to the system settings
Adjustable security levels
click to edit
Explore the need of Windows Update
Security
Protects against threats and vulnerabilities
Stability
Compatibility
Features
Performance
Compliance
User Experience
Data Protection
Fixes bugs for a smoother experience.
Ensures support for new software and hardware.
Introduces new functionalities and optimizations.
Improves system efficiency.
Meets legal and regulatory requirements.
Enhances interface and usability.
Addresses privacy and security concerns.
Configure the various elements in Advanced Firewall.
Open Windows Firewall with Advanced Security:
Press the Windows key + S to open the search bar.
Type "Windows Firewall with Advanced Security" and select it from the results.
Overview of Advanced Security:
You will see three main nodes on the left: Inbound Rules, Outbound Rules, and Connection Security Rules.
Rule Types:
Inbound: Traffic coming in.
Outbound: Traffic going out.
Create a Rule:
Right-click on Inbound Rules or Outbound Rules, choose New Rule, and follow the wizard.
Connection Security Rules:
Used for advanced network setups.
Monitoring and Logging:
Check activity under Monitoring and enable logging for details.
Advanced Settings:
-Right-click on the main window, go to Properties.
-Configure profiles, IPsec, and notifications.
Rule Order:
Adjust rule order for priority.
Action
Right-click on a rule, go to Properties, and choose Allow or Block.
Apply Changes:
Click OK to save changes.