Reflection:
The main purpose of this lab is to protect the computer against virus intrusion by using the security of the host.
Discuss when you may need to use the Windows Defender feature from the lab
Windows Defender is an anti-malware feature found on Windows 10 systems. We should use the Windows defender feature when checking if the computer is at risk. In addition, this feature can be used if we want to see if a file is at risk. This feature allows you to quickly and accurately identify which folders are at risk.
Discuss a scenario when you may need to use the Online Anti-Malware Scanner
First, we need to download a program for anti-malware scanning. In addition, we need to read all the terms carefully and confirm. Second, we need to scan some files that may be at risk. Finally, the application window of the security scanner should be closed when all scans have ended.
Select a feature Internet Explorer Browser Security from the lab and discuss the reason it is required.
1. Internet Explorer browser protects your privacy by installing filters and blocking pop-ups.The Internet Explorer browser can effectively block you from entering any false information at risk. Therefore, Internet Explorer can guarantee the security of your Internet access.
2.The Internet Explorer browser can provide you with filtering capabilities. The ActiveX program can remind you if the software is from a publisher of trusted software. This way you have the ability to safely download the software you need.
3.Take advantage of ActiveX’s filtering capabilities. You can see who signed the website. In addition, you can also view the certificate to determine the validity period.
Critical Thinking Analysis
How the lab could be improved (in relation topic)
This lab gives us how to use the Windows Defender feature to check for risk in the file. In addition, an Internet Explorer browser is provided to allow you to have a secure environment to download software and protect your privacy. However, this lab does not provide a display of documents and websites at risk. If you can compare the security of the check file or website with the risk of the website content. This may be more beneficial for us to practice
What problems I encountered
The first major issue in the lab was not to tell us how to establish the security of the host. The lab is asking us to build a secure environment for the host. However, what the lab teaches us is how to view documents and websites for risks. Therefore, there is no discussion on how to establish host security.