Vlnlrability | Win Security Setting

Cards (14)

  • Non-compliant systems refer to systems that do not adhere to the established organizational procedures, also known as a baseline.
  • Unpatched systems pose a security risk as they contain vulnerabilities (or 'holes') in the operating system that attackers can exploit.
  • EOL OS refers to using an operating system that is no longer supported or has been deprecated, which can lead to security vulnerabilities.
  • BYOD introduces security challenges as employees use their personal devices for work, potentially bypassing organizational security measures.
  • Unprotected systems, lacking antivirus or firewall protection, are vulnerable to malware, unauthorized access, and other security threats.
  • Defender Antivirus is a built-in security feature in Windows that provides real-time protection against software threats like viruses, malware, and spyware.
  • Firewall in Windows provides security by monitoring and controlling incoming and outgoing network traffic based on predetermined security rules.
  • Firewall in Windows manages port and application security to prevent unauthorized access.
  • Local accounts are stored on the machine itself, while Microsoft accounts are cloud-based and can be used to access various Microsoft services like Outlook, OneDrive, and the Microsoft Store.
  • A standard account in Windows has limited privileges and is designed for everyday use.
  • A standard account in Windows can run most software but cannot make changes that affect other users or the security of the computer.
  • The login OS options in Windows security settings include username and password, personal identification number (PIN), fingerprint, facial recognition, and single sign-on (SSO).
  • Virus definition database files contain detection patterns for known viruses
  • Ctrl + Shift + Left click to run an application with administrator privileges.