CFY-Operating Systems Lab 9 Firewalls, anti-virus software.

Topics

Firewall:  What is a firewall?  Adding exceptions to Firewall. o An exception in your firewall allows network traffic access to your computer for the particular exception  Demo of firewall using Remote Desktop Software o RDS is used to remotely control to another computer from your computer o Need to set up your computer (local) to remotely connect o Need to set remote computer (host) to accept connection  Network profile settings: Domain, Private and Public  Firewall log file and interpreting it  Customizing Incoming & Outgoing connections

Windows Firewall

Youtube video on Firewalls: http://www.youtube.com/watch?v=vlnBdgIVgNA This video is 15 minutes long so we recommend you watch it on your own time.

Theory 1 : Research what is meant by a firewall.

Write down a brief description in your own words.

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Use your VMWare account to carry out this lab sheet.

Task 1: Turn on the firewall in Windows 7, if it’s not already on. How did you do this?

……………………………………………………………………………………………………………

Refer to: http://windows.microsoft.com/is-IS/windows7/Turn-Windows-Firewall-on-or-off Lab 9: Firewalls, AntiVirus etc.. Page 1 of 15 CFY-Operating Systems

You can have different security settings for your computer at home/work (private) versus public. Public would be using your computer when on a train or in a cafe or hotel.

Allow Programs communicate through the Firewall

Task 2: What is the exceptions list of a firewall used for? How do you use it?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

…………………………………………………………………………………………………………… Ref: http://www.sevenforums.com/tutorials/542-windows-firewall-add-remove-exception.html

Task 3: Add Windows Media Player to the exception list. How did you do this?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Lab 9: Firewalls, AntiVirus etc.. Page 2 of 15 CFY-Operating Systems What are the risks of allowing a program to communicate? Hint:Click on the hyperlink that can be found in the Task 2 screenshot.

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Now, remove Windows Media Player from the exception list.

Task 4: Add a program when it is not on the list of “Allowed Programs and Features”

This time we shall add a program whereby it is NOT on the list of “Allowed Programs and Features”. Click on the “Allow another program” button (See screenshot in TASK2).

(Use Windows Media Player again for demo purposes). Find the path to the application. How did you find this?

……………………………………………………………………………………………… For Windows Media Player it is: C:\Program Files\Windows Media Player\wmplayer.exe (see below)

Use this path to add an exception to the firewall. How did you do this?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Lab 9: Firewalls, AntiVirus etc.. Page 3 of 15 CFY-Operating Systems Remote Desktop Software

Task 5: What is the Remote Desktop Software used for?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Task 6: In order to let someone connect to your machine, you will need to put a password on your login account. Goto Control panel/ User accounts/ Select your account called ? ......

Set the password of this account to ; itcarlow

Task 7: Now you can proceed. In order to let users connect to your machine, you must first enable the Remote Desktop Connection. How do you do this?

Ref: http://www.howtogeek.com/howto/windows-vista/turn-on-remote-desktop-in-windows-vista/

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Note: when you have enabled this, examine the firewall exception list again. An extra exception has been checked. What is this exception ? ……………………………………………

Task 8: Next, you are going to attempt to connect to the Virtual machine of the student beside you using remote desktop.

To connect, you will require their IP address, Username (labuser) & Password (itcarlow). Now run the RDS program by clicking The Start button, then All Programs, then Accessories and then Remote Desktop Connection OR Windows key + r (to run a program) followed by mstsc.exe (and press enter).

What do you see when the connection is complete.

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Lab 9: Firewalls, AntiVirus etc.. Page 4 of 15 CFY-Operating Systems

Task 9: Remove the exception in your firewall that allows for the remote desktop connection to take place and ask for another student to connect to your computer using the Remote Desktop Software. What do you expect to happen?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

What Happened?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

An exception in your firewall allows network traffic access to your computer for the particular exception. Re-enable the exception for the Remote Desktop Connection on your computer and ask your class mate to remote desktop into your machine. Does it work?

……………………………………………………………………………………………………………

Types of Traffic Blocked

Task 10: Adding an exception to the firewall is unblocking an incoming connection. Outgoing connections can also be blocked/unblocked. Briefly describe the implications of Incoming & Outgoing connections. Examine the link: http://www.mcmcse.com/microsoft/guides/70-680/configure_windows_firewall.shtml

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Press the start button in Windows 7, then key in firewall and press enter. (You are taken to advanced firewall settings).

Lab 9: Firewalls, AntiVirus etc.. Page 5 of 15 CFY-Operating Systems

Network Profiles

Task 11: There are 3 types of Network profile settings: Domain, Private and Public What is the difference between them?

Domain Profile

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Private Profile ……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Public Profile

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Lab 9: Firewalls, AntiVirus etc.. Page 6 of 15 CFY-Operating Systems

Task 12: You can block or allow incoming and outgoing connections to a network. Change the setting to Block all Inbound connections on the Public network ONLY?

How did you do this?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Firewall Log Files

Task 13: A log file can be kept for any communication through the firewall. What is the name and location of this log file? ……………………………………………………

Is it created by default? ………………………

What 2 settings can be set on the firewall?

………………………………………………………………………………………………

Is there a maximum size for this file and what is it? …………………...... Ref: http://technet.microsoft.com/en-us/library/cc947815(v=ws.10).aspx

Lab 9: Firewalls, AntiVirus etc.. Page 7 of 15 CFY-Operating Systems

Task 14: Set up your log file so that it logs if someone tries to connect to your computer and are successful. How did you do this?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Test that this works by getting someone to connect to your computer. Then check if it is logged in the log file. Try to read the log file in Notepad. Read this http://technet.microsoft.com/en- us/library/cc753781(v=ws.10).aspx to help interpret the log file.

Reset the log file settings to what they were before, when finished.

Customizing Incoming & Outgoing connections

This Youtube has info on this topic: http://www.youtube.com/watch?v=vlnBdgIVgNA You have viewed this already so view it again, if required.

Task 15: How would you block a particular outgoing or incoming connection?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Have a brief look at the Remote Assistance Inbound Rules for example:

Lab 9: Firewalls, AntiVirus etc.. Page 8 of 15 CFY-Operating Systems

Task 16: Are the rules active or inactive? What network(s) are affected by the rules?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Have a brief look at the Remote Desktop Outbound Rules for example.

Important: You are not expected to be able to setup Inbound or Outbound Rules.

Next Topics

Computer Security:  Antivirus  Internet settings. o Internet security levels, Active X controls, PopUps, Phishing

Antivirus

Task 1: Download and install the trial version of anti-virus software Avira AntiVir Personal. http://www.download.com Important: Don’t register the software

Once downloaded, start the software checking your C drive. Stop it after a minute.

How would you update the software with the latest new virus information so that it is able to detect and isolate them?

……………………………………………………………………………………………………………

There is no need to run the update.

What other software can you download on a free trial from this website? There is no need to do so.

…………………………………………………………………………………………………………… Lab 9: Firewalls, AntiVirus etc.. Page 9 of 15 CFY-Operating Systems

Question: Why is it important to force windows to show file extensions?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Task 2: How would you set up your OS to display file extensions when displaying file details?

……………………………………………………………………………………………………………

Internet Security Levels

Task 3: What security setting is your Internet browser set to and how could it be changed?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Lab 9: Firewalls, AntiVirus etc.. Page 10 of 15 CFY-Operating Systems

A ctive X Controls

Theory 1: What are Active X controls? Write down a brief description in your own words in the space provided.

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Task 4: Where is the option in the Internet Explorer browser that manages ActiveX controls? Ref: http://technet.microsoft.com/en-us/library/cc817491.aspx

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

How would you set up or disable automatic prompting for ActiveX controls?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

How would you disable the download of unsigned ActiveX controls?

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Lab 9: Firewalls, AntiVirus etc.. Page 11 of 15 CFY-Operating Systems

What is an Internet Explorer add-on? Hint: Choose Tools from the menu, Then choose Manage Add-ons. In the “Show” drop down box click All add-ons.

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

How would you disable one of the add-ons? For example how would you disable the Windows Media Player ActiveX control? Hint: Right click on the add-on to see the additional information about it.

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Related Reading: http://pcsupport.about.com/od/fixtheproblem/ht/disableie7activ.htm http://windows.microsoft.com/en-US/windows-vista/Internet-Explorer-add-ons-frequently-asked-questions

Lab 9: Firewalls, AntiVirus etc.. Page 12 of 15 CFY-Operating Systems

Popup Blocker & Phishing Filter

Theory 2: What is a popup Blocker? Write down a brief description in your own words in the space provided.

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Theory 3: What is a Phishing? And describe what a Phishing Filter does? Write down a brief description in your own words in the space provided.

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Task 5: How do you get into the popup Blocker settings? Ref: http://browsers.about.com/od/internetexplorertutorials/ss/ie8popupblocker_7.htm

Task 6: How do you turn on the Smart Screen Filter in Internet Explorer? Note: Phishing Filter has been updated and replaced by SmartScreen Filter in Internet Explorer 8.

Ref: http://support.microsoft.com/kb/930168

……………………………………………………………………………………………………………

……………………………………………………………………………………………………………

Lab 9: Firewalls, AntiVirus etc.. Page 13 of 15 CFY-Operating Systems

Questions to be done on your own time and discussed in the next lab:

1 What is a Trojan horse? How can it damage your computer? Write down a brief description in your own words in the space provided.

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

2 What is a Cookie? Write down a brief description in your own words in the space provided.

………………………………………………………………………………………………

………………………………………………………………………………………………

……………………………………………………………………………………………… 3 What is a Worm?

Ref: http://en.wikipedia.org/wiki/Morris_worm

Write down a brief description in your own words in the space provided.

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

4 What is spyware? Write down a brief description in your own words in the space provided.

………………………………………………………………………………………………

………………………………………………………………………………………………

………………………………………………………………………………………………

Lab 9: Firewalls, AntiVirus etc.. Page 14 of 15 CFY-Operating Systems

Revision

Q1. Turn on the firewall. How would you set up your computer to allow another computer to connect to yours using the Skype software or Remote Assistance? How did you do this?

Q2. How would you set up Internet Explorer to enable the Pop Up Blocker.

Q3(a) You have downloaded Skype which is a software application that allows users to make voice calls over the Internet. What settings do you need to set or check for, on Windows Firewall in order for Skype to work correctly.

(b) Describe how you would set these settings.

Q4(a) Windows Firewall keeps track of communication through the firewall in a log file. What is the name of the firewall log file and where is it stored?

(b) Can this filename be changed? ……………………………

(c) What is its maximum size? When set to this size express your answer in Gigabytes and Terabytes.

Lab 9: Firewalls, AntiVirus etc.. Page 15 of 15