Installing and Configuring System Center Configuration Manager (SCCM)

0%

0/1 Lessons

Getting Started with this Course

• 26min

0 / 3 lessons complete

System Center Configuration Manager - Features and Capibilities

• 31min

0 / 5 lessons complete

SCCM 1902 Lab Setup

• 50min

0 / 12 lessons complete

Installing SCCM 1902 Installation

• 1hr 17min

0 / 11 lessons complete

Configuration Manager Basics

• 1hr 53min

0 / 8 lessons complete

Updating SCCM

• 30min

0 / 7 lessons complete

SCCM Client Installation

• 46min

0 / 4 lessons complete

User and Device Collections

• 1hr 0min

0 / 13 lessons complete

Application Management

• 2hr 34min

0 / 12 lessons complete

Operating System Deployment

• 23min

0 / 7 lessons complete

Endpoint Protection

• 1hr 12min

0 / 10 lessons complete

Troubleshooting

• 37min

0 / 4 lessons complete

Problems and Solutions from the Message Board

• 14min

0 / 5 lessons complete

You need to sign up to get access!

Sign up to get full access to this course.

Sign up to access this lesson

Click here to sign up and get access to this lesson!

Saving Progress...

An Overview of Network Security

  • There are a number of threats that could affect you, or your organization 
  • Network Security is something that everyone will need to understand 
  • It’s your job, as an Endpoint Administrator to educate your users. I suggest that you show the users in your organization this video. 

Adware – What is Adware? Adware is designed to display advertisements on your computer 

  • People have asked, how did adware get installed on my computer?

Most of the time you get Adware from downloading software bundles – These programs install adware alongside programs you can get for free.

  • Adware knows what types of ads to display, based on the users computing habits. Sites visited and computer usage.
  • For prevention download your software from an official site, not a third-party site.

Spyware – What is Spyware? Spyware is designed to steal a user’s personal information.  

  • Spyware is a form of malware which is short for malicious software 
  • Spyware is installed without the users knowledge, it runs in the background. 
  • Spyware can record audio, video, and record calls from your smartphone and capture credit card numbers.

For prevention – Be selective about what you download to your computer. Beware of clickable advertisements

Mitigation of spyware and adware 

  • Be aware that free software can include spyware or malware.
  • Be sure that your antimalware software is up to date.

Viruses, Trojans and Rootkits 

  • These are all installed without user’s knowledge

What is a computer virus? 

  • A computer virus is a piece of code that is capable of copying itself, and has the potential of destroying data and corrupting your operating system. 
  • A virus can be application specific. For example, a macro virus for a Microsoft Word application can replace the regular commands with the same name, and run, when the command is selected. These malicious macros may start automatically when a document is opened or closed, without the user’s knowledge. 
  • A virus can be triggered by date and time or event, the virus could be triggered next time you visit a certain website as well.

Rootkit – What is a rootkit? A rootkit allows a person to get admin level access to your computer system. 

Rootkits: 

  • Often replaces operating system files
  • Allows criminals access to the device
  • Applies to Windows, Linux/Unix
  • For prevention avoid clicking a questionable email link. The rootkit is spread because the user clicks on a malicious link in an email, and now the root kit is spread to all recipients and sent to all the people in the users contact list.

Trojan 

  • Masquerades as legitimate software 
  • The user is fooled thinking that they are downloading and installing helpful software when in fact it is malware. 
  • The criminal takes control of the computer in the background and starts sending personal information over the internet to thieves. 
  • Trojans are executables, they have extensions like “exe” “vbs” “com “bat”. Generally, you have to open the file before you are affected. 
  • For prevention do not click on an attachment unless you are sure of the source. 

Mitigation of Viruses, Trojans and Rootkits 

  • Educate your users, define each threat. Make your users aware of what to do and what not to do. 
  • Be sure your antimalware is up to date
  • Beware of free software 

Phishing 

  • Tricks victims into revealing personal or sensitive information such as passwords, SSN, addresses) 
  • Fraudulent email messages, telephone calls, website links 
  • Phishing is all about stealing personal information such as username and passwords Ransomware 
  • Blocks access to your computer until a ransom is paid
  • It could encrypt data files until the ransom is paid
  • Ransomware requests Bitcoin payments, (which are hard to trace to the recipient of the payment)
  • Does not guarantee that you will get your data back if your system has been encrypted with the ransomware.
  • Can be infected by viewing a website not just clicking.
  • Ransomware features unbreakable encryption
  • It can scramble your file names and add a different extension to your files.  

Sign up to access the rest of this lesson

You must either log in or sign up to access this lesson.

Saving Progress...

0 0 votes
Lesson Rating
Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments