Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Microsoft Exam MD-100 Windows 10 Certification Guide

You're reading from  Microsoft Exam MD-100 Windows 10 Certification Guide

Product type Book
Published in May 2020
Publisher Packt
ISBN-13 9781838822187
Pages 442 pages
Edition 1st Edition
Languages
Author (1):
Jeroen Burgerhout Jeroen Burgerhout
Profile icon Jeroen Burgerhout

Table of Contents (20) Chapters

Preface 1. Section 1 : Deploying Windows
2. Chapter 1: Deploying Windows 10 3. Chapter 2: Upgrading Windows 10 4. Chapter 3: Customizing and Configuring Windows 10 5. Section 2 : Managing Devices and Data
6. Chapter 4: Managing Local Users, Groups, and Devices 7. Chapter 5: Configuring Permissions and File Access 8. Chapter 6: Configuring and Implementing Local Policies 9. Chapter 7: Securing Data and Applications 10. Section 3: Configuring Connectivity
11. Chapter 8: Configuring Various Networks 12. Chapter 9: Configuring Remote Connectivity 13. Section 4: Maintaining Windows
14. Chapter 10: Understanding Troubleshooting and Recovery 15. Chapter 11: Managing Updates 16. Chapter 12: Managing Log Files 17. Chapter 13: Mock Exam (A and B) 18. Assessments 19. Other Books You May Enjoy

Configuring Threat Protection

A Windows 10 computer is more vulnerable to threats that originate from the network than from any other location. This is because network attacks can target a significant number of computers, while other forms of attacks require physical access to the computer. In this section, you will understand what malware and threat protection is. Furthermore, you will learn about the advanced protection methods that you can use to reduce threat protection.

Understanding malware and threat protection

Malicious software, or malware, is software that attackers design to harm computer systems. Malware can do many things, from causing damage to the computer to allowing unauthorized parties remote access to the computer, to collecting and transmitting sensitive information to unauthorized third parties. There are several types of malware, including the following:

  • Computer viruses
  • Computer worms
  • Trojan horses
  • Ransomware
  • Spyware

To protect...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}