When you sign in with a Microsoft account, whatever restrictions Hotmail enforces are automatically applied to your PC. But this is only required if you are using Microsoft’s bundled Mail app. If you access Hotmail’s e-mail, calendar, and contacts from a Windows application, or from the web, you can decouple Hotmail’s EAS policy requirements from your PC. And, oddly enough, you do this from the User Accounts control panel: Just click Reset EAS Policies on the left, and you’ll see a window like the one shown in Figure 12-13.

Figure 12-13: You can reset EAS policies on your PC.

The User Accounts Control Panel and Domain Accounts

The User Accounts control panel experience described in this chapter applies only to those who sign in with a local or Microsoft account. If you sign in with a domain account—or on a PC for which a domain account has been configured—you’re going to see some different options in the User Accounts control panel.

While many of these options are only of interest to domain administrators, it’s worth pointing out one of the common tasks we mentioned earlier is managed using this interface: changing an account type. To change an account type, click Manage User Accounts. Instead of opening a new view in the User Accounts control panel window, you will see the old-school windows in Figure 12-14.

Figure 12-14: User Accounts management on a domain-based system.

Now, select the account you want to change—and if you see two entries for one account, as you will for Microsoft accounts, choose the top one—and click Properties. Then just choose Standard user or Administrator from that window.

The easing of restrictions will apply until and unless you run the Mail, Calendar, People, or Messaging app (s) again. At that time, the EAS policies required by Hotmail will be simply be silently reapplied. If you sign in with a corporate account, however, it won’t be so silent: You’ll be prompted to accept the policies change.

Security and Windows 8: Keeping Your PC Safe

While Mac partisans and tech pundits like to present a tortured view of how difficult it is to secure a Windows PC, the truth is far less dramatic. Previous to Windows 8, there were a few simple steps you could take to technically secure your PC—enabling automatic updates and installing an antivirus solution—and that, combined with some good old-fashioned common sense was all that was required.

In Windows 8, you’ll be ecstatic to know, it’s even easier.

Under the hood, of course, Microsoft’s decades-long commitment to system security continues. This version of Windows includes the same anti-malware technology, firewall, User Account Control, and other security features that made Windows 7 the most secure version of Windows yet. And then they turned it up a notch by adding two crucial new features: Antivirus is now included in the OS, finally, so you won’t need to add that separately. And the SmartScreen protection feature that the company debuted in Internet Explorer 9 is now part of Windows, so you’re protected even if you use competing browsers.

You’ll still want to employ common sense. But that’s not a focus of this book.

Windows Defender

Microsoft has included an integrated anti-spyware and anti-malware solution called Windows Defender since Windows Vista. Defender was good at what it did—in fact, most Windows users simply aren’t even aware of its existence, which is proof of its efficiency—but it’s always been lacking one crucial feature: It didn’t include antivirus functionality. So we recommended an external and free utility called Microsoft Security Essentials (MSE) for this purpose: MSE looked and worked just like Defender, but it added that one crucial feature, completing the Windows security picture.

Now, Windows Defender includes the same antivirus functionality that used to be part of Microsoft Security Essentials. It’s built into Windows 8, it’s enabled by default, and you get it for free, just for buying into Windows 8.

This is exciting because both of us have used MSE for years, and we trust it to protect not only our own PCs, but more crucially those of our families and friends. And we’ve experienced no major issues yet. Not once.

So our advice is simple. Assuming you’re not spending your time in the nether regions of the web, downloading illegal software and goodness knows what else, Windows Defender is enough. It’s lightweight and quiet, and it won’t bother you with annoying pop-up dialogs. You won’t need other security applications or even more expensive security suites. You know, assuming that common sense is employed.

TIP

Okay, there is one more thing you can continue doing from time to time: Use a second anti-malware utility. (You should never use two antivirus solutions, however, because they will interfere with each other.) It’s not necessary to leave the second anti-malware utility running in real time, but it’s a good idea to run it once in a while, just to make sure something hasn’t slipped by.

But we know you want to know a bit more about Windows Defender.

Shown in Figure 12-15, Windows Defender has a simple interface. From here, you can trigger a malware and virus scan, check for updates, view the history of Defender’s activities, or access various options. It works just as Defender did in Windows 7, except that it’s now checking, in real time, for viruses as well as spyware and other malware.

Figure 12-15: Windows Defender

There’s not a heck of a lot to do here. Configured properly, Defender’s real-time protection against viruses and malware will be enabled, and its virus and malware definitions—part of its ability to detect errant software— should be up to date. You can manually update the definitions from the Update tab, but it’s unlikely there’s an issue here unless the PC has been offline for weeks or longer.

Potentially harmful items that have been found are cataloged on the History tab. Here, you’ll see different buckets for quarantined, allowed, and all detected items. If there are any items here, you can further remediate them if you’d like—perhaps by removing them entirely—but there’s usually no reason to bother.

The Settings tab has, as expected, a number of configuration options and is worth looking at. For example, you can configure Defender to scan removable drives during a full scan. This is desirable if you regularly use an external disk, like a USB hard drive, when you’re home. You can also configure Defender to automatically remove quarantined items after a set time period—by default it does nothing—and determine whether to participate in Microsoft’s Active Protection Service, or MAPS, which is used to make Defender more effective for everyone. Do your part: We recommend at least a basic membership.

Boot-Time Security

Вы читаете Windows 8 Secrets
Добавить отзыв
ВСЕ ОТЗЫВЫ О КНИГЕ В ИЗБРАННОЕ

0

Вы можете отметить интересные вам фрагменты текста, которые будут доступны по уникальной ссылке в адресной строке браузера.

Отметить Добавить цитату