CompTIA A+ 1202 Objective 2.2: Configure and Apply Basic Microsoft Windows OS Security Settings

35 min readCompTIA A+ Core 2 Certification

CompTIA A+ Exam Focus: This objective covers essential Windows security configuration including Defender Antivirus, firewall settings, user account management, authentication methods, file permissions, encryption, and Active Directory integration. These skills are fundamental for IT professionals securing Windows environments in business and enterprise settings.

Defender Antivirus

Windows Defender Antivirus is Microsoft's built-in malware protection solution that provides real-time protection against viruses, malware, and other threats. Understanding how to configure and manage Defender is essential for Windows security.

Activate/Deactivate Defender Antivirus

Activation Methods:

  • Windows Security App: Settings → Update & Security → Windows Security
  • Group Policy: Computer Configuration → Administrative Templates → Windows Components → Microsoft Defender Antivirus
  • Registry: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
  • PowerShell: Set-MpPreference cmdlets
  • Command Line: sc config WinDefend start= auto

Deactivation Scenarios:

  • Third-party Antivirus: Automatically disabled when compatible antivirus is installed
  • Enterprise Management: Disabled via Group Policy in managed environments
  • Temporary Disable: Short-term disable for troubleshooting
  • Registry Modification: Manual disable via registry (not recommended)

Update Definitions

Update Methods:

  • Automatic Updates: Default behavior - updates daily via Windows Update
  • Manual Update: Windows Security → Virus & threat protection → Check for updates
  • Windows Update: Updates delivered through Windows Update service
  • Microsoft Update Catalog: Manual download of definition updates
  • WSUS: Windows Server Update Services for enterprise environments

Update Configuration:

  • Update Frequency: Configure how often definitions are updated
  • Update Source: Microsoft Update, WSUS, or local source
  • Bandwidth Throttling: Limit bandwidth usage for updates
  • Update Notifications: Configure user notifications for updates

Firewall

Windows Defender Firewall provides network security by controlling incoming and outgoing network traffic. Proper firewall configuration is crucial for protecting systems from network-based threats.

Activate/Deactivate Firewall

Activation Methods:

  • Windows Security: Windows Security → Firewall & network protection
  • Control Panel: Control Panel → System and Security → Windows Defender Firewall
  • Command Line: netsh advfirewall set allprofiles state on
  • PowerShell: Set-NetFirewallProfile -Enabled True
  • Group Policy: Computer Configuration → Windows Settings → Security Settings → Windows Defender Firewall

Firewall Profiles:

Domain Profile
  • Applied when connected to domain
  • Most permissive settings
  • Managed by domain policies
Private Profile
  • Applied to trusted networks
  • Moderate security settings
  • Home and office networks
Public Profile
  • Applied to untrusted networks
  • Most restrictive settings
  • Public Wi-Fi, hotels

Port Security

Port Configuration:

  • Inbound Rules: Control incoming connections to specific ports
  • Outbound Rules: Control outgoing connections from specific ports
  • Port Ranges: Configure rules for port ranges
  • Protocol Support: TCP, UDP, and other protocols
  • Source/Destination: Specify source and destination addresses

Common Port Rules:

  • HTTP (80): Web server access
  • HTTPS (443): Secure web server access
  • RDP (3389): Remote Desktop Protocol
  • FTP (21): File Transfer Protocol
  • SSH (22): Secure Shell
  • SMTP (25): Email server

Application Security

Application Rules:

  • Program Rules: Allow or block specific applications
  • Path-based Rules: Rules based on application file paths
  • Service Rules: Rules for Windows services
  • Predefined Rules: Built-in rules for common applications
  • Custom Rules: User-defined application rules

User and Groups

Proper user account and group management is fundamental to Windows security. Understanding different account types and their capabilities is essential for maintaining secure access control.

Local vs. Microsoft Account

Local Account:

  • Offline Access: Works without internet connection
  • Local Storage: Credentials stored locally on device
  • Limited Integration: No integration with Microsoft services
  • Administrative Control: Full control by local administrators
  • Security: Relies on local password policies

Microsoft Account:

  • Cloud Integration: Syncs across multiple devices
  • Microsoft Services: Access to OneDrive, Office 365, etc.
  • Two-Factor Authentication: Enhanced security options
  • Password Recovery: Online password reset capabilities
  • Single Sign-On: Access to multiple Microsoft services

Standard Account

Capabilities:

  • Limited Privileges: Cannot install system-wide software
  • User Data Access: Access to own files and folders
  • Application Usage: Can run most applications
  • Settings Modification: Can modify personal settings
  • UAC Prompts: Requires elevation for administrative tasks

Administrator Account

Capabilities:

  • Full System Access: Complete control over system
  • Software Installation: Can install and uninstall software
  • System Configuration: Can modify system settings
  • User Management: Can create and manage user accounts
  • Security Risk: High privilege level increases security risk

Guest User

Characteristics:

  • Limited Access: Very restricted access to system
  • Temporary Use: Designed for temporary access
  • No Password: Typically no password required
  • Profile Deletion: Profile deleted on logout
  • Network Access: Limited network access

Power User

Legacy Account Type:

  • Windows XP Era: Primarily used in Windows XP
  • Limited Admin Rights: Some administrative privileges
  • Deprecated: No longer available in modern Windows
  • Replaced by: Standard user with UAC elevation

Log-in OS Options

Windows provides multiple authentication methods for user log-in, each with different security characteristics and use cases.

Username and Password

Traditional Authentication:

  • Most Common: Standard authentication method
  • Password Policies: Enforce complexity and expiration
  • Account Lockout: Lock account after failed attempts
  • Password History: Prevent password reuse
  • Brute Force Protection: Rate limiting for login attempts

Personal Identification Number (PIN)

PIN Authentication:

  • Device-Specific: PIN tied to specific device
  • Quick Access: Faster than password entry
  • Numeric Only: Typically 4-8 digits
  • Local Storage: Stored securely on device
  • Windows Hello: Part of Windows Hello authentication

Fingerprint

Biometric Authentication:

  • Windows Hello: Integrated with Windows Hello
  • Hardware Required: Fingerprint reader hardware needed
  • Multiple Fingers: Can register multiple fingerprints
  • Secure Storage: Biometric data stored securely
  • Fallback Options: PIN or password as backup

Facial Recognition

Windows Hello Face:

  • Infrared Camera: Uses IR camera for depth mapping
  • Liveness Detection: Prevents spoofing with photos
  • 3D Mapping: Creates 3D facial map
  • Lighting Independent: Works in various lighting conditions
  • Privacy Focused: Data stays on device

Single Sign-On (SSO)

SSO Implementation:

  • Domain Authentication: Authenticate once to domain
  • Kerberos Protocol: Uses Kerberos for authentication
  • Token-based: Uses authentication tokens
  • Seamless Access: Access multiple resources without re-authentication
  • Centralized Management: Managed through Active Directory

Passwordless/Windows Hello

Windows Hello Features:

  • Biometric Authentication: Face, fingerprint, or iris recognition
  • PIN Backup: PIN as fallback authentication
  • Device Security: Tied to specific device hardware
  • Enterprise Ready: Supports enterprise authentication
  • Privacy Protection: Biometric data never leaves device

NTFS vs. Share Permissions

Understanding the difference between NTFS and share permissions is crucial for proper file and folder security in Windows environments.

NTFS Permissions

Permission Types:

  • Full Control: Complete access including permission changes
  • Modify: Read, write, execute, and delete
  • Read & Execute: Read and execute files
  • List Folder Contents: View folder contents
  • Read: View files and folders
  • Write: Create and modify files

Share Permissions

Permission Levels:

  • Full Control: Complete access over network
  • Change: Read, write, and delete over network
  • Read: View files over network
  • Network Only: Apply only when accessing over network

File and Folder Attributes

Common Attributes:

  • Read-only: Prevents modification of files
  • Hidden: Hides files from normal view
  • System: Marks files as system files
  • Archive: Indicates file needs backup
  • Compressed: File is compressed to save space
  • Encrypted: File is encrypted using EFS

Inheritance

Permission Inheritance:

  • Inherited Permissions: Permissions inherited from parent folders
  • Explicit Permissions: Directly assigned permissions
  • Effective Permissions: Final permissions after inheritance
  • Block Inheritance: Prevent inheritance from parent
  • Force Inheritance: Force inheritance to child objects

Run as Administrator vs. Standard User

Administrator Mode:

  • Elevated Privileges: Full system access
  • System Changes: Can modify system settings
  • Software Installation: Can install system-wide software
  • Security Risk: Higher risk of malware infection
  • UAC Bypass: Bypasses User Account Control

Standard User Mode:

  • Limited Privileges: Restricted system access
  • UAC Prompts: Requires elevation for admin tasks
  • User Data Only: Access limited to user data
  • Security Benefit: Reduced security risk
  • Best Practice: Recommended for daily use

User Account Control (UAC)

UAC Levels:

  • Always Notify: Notify for all changes
  • Notify Only When Apps Try to Make Changes: Default setting
  • Notify Only When Apps Try to Make Changes (Do Not Dim): No desktop dimming
  • Never Notify: Disable UAC (not recommended)

UAC Benefits:

  • Malware Prevention: Prevents unauthorized system changes
  • Privilege Separation: Separates user and admin privileges
  • Consent Framework: Requires explicit consent for elevation
  • Application Compatibility: Maintains compatibility with legacy apps

BitLocker

BitLocker Features:

  • Full Disk Encryption: Encrypts entire system drive
  • TPM Integration: Uses Trusted Platform Module
  • Recovery Keys: Recovery options for forgotten passwords
  • Pre-boot Authentication: Authentication before OS loads
  • Enterprise Management: Centralized management via Group Policy

BitLocker Requirements:

  • Windows Pro/Enterprise: Not available in Windows Home
  • TPM 1.2 or 2.0: Trusted Platform Module required
  • UEFI Firmware: Modern firmware recommended
  • Secure Boot: Secure Boot enabled for best security

BitLocker-To-Go

Portable Drive Encryption:

  • USB Drive Encryption: Encrypts portable storage devices
  • Password Protection: Password-based authentication
  • Cross-platform: Works on Windows and other systems
  • Automatic Unlock: Can auto-unlock on trusted computers
  • Recovery Options: Recovery key for forgotten passwords

Encrypting File System (EFS)

EFS Features:

  • File-level Encryption: Encrypts individual files and folders
  • Transparent Operation: Automatic encryption/decryption
  • User Certificates: Uses digital certificates for encryption
  • Recovery Agents: Designated recovery agents for data recovery
  • NTFS Integration: Integrated with NTFS file system

Active Directory

Active Directory is Microsoft's directory service that provides centralized authentication, authorization, and management for Windows networks.

Joining Domain

Domain Join Process:

  1. System Properties: Access System Properties → Computer Name tab
  2. Change Settings: Click "Change" to modify computer name
  3. Domain Selection: Select "Domain" and enter domain name
  4. Authentication: Provide domain administrator credentials
  5. Restart: Restart computer to complete domain join

Assigning Log-in Script

Script Assignment:

  • User Properties: Active Directory Users and Computers
  • Profile Tab: Configure logon script path
  • Group Policy: Assign scripts via Group Policy
  • Script Types: Batch files, PowerShell, VBScript
  • Execution Order: Scripts run in specific order

Moving Objects Within Organizational Units

OU Management:

  • Drag and Drop: Move objects between OUs
  • Cut and Paste: Alternative method for moving objects
  • PowerShell: Move-ADObject cmdlet for automation
  • Group Policy Inheritance: OUs inherit policies from parent OUs
  • Delegation: Delegate management of specific OUs

Assigning Home Folders

Home Folder Configuration:

  • User Properties: Configure in user account properties
  • Profile Tab: Set home folder path
  • Drive Mapping: Map to specific drive letter
  • Network Path: Use UNC path for network storage
  • Permissions: Set appropriate permissions on home folder

Applying Group Policy

Group Policy Management:

  • Group Policy Management Console: Central management tool
  • Policy Linking: Link policies to OUs, domains, or sites
  • Policy Inheritance: Policies inherit from parent containers
  • Policy Precedence: Local, Site, Domain, OU order
  • Policy Enforcement: Force policy application

Selecting Security Groups

Group Types:

  • Security Groups: Used for permissions and access control
  • Distribution Groups: Used for email distribution
  • Universal Groups: Can contain users from any domain
  • Global Groups: Can contain users from same domain
  • Domain Local Groups: Used for local domain resources

Configuring Folder Redirection

Redirection Options:

  • Desktop: Redirect desktop to network location
  • Documents: Redirect My Documents folder
  • Pictures: Redirect Pictures folder
  • Music: Redirect Music folder
  • Videos: Redirect Videos folder

Redirection Benefits:

  • Centralized Storage: User data stored on network
  • Backup Protection: Automatic backup of user data
  • Roaming Profiles: Access data from any computer
  • Disk Space Management: Reduce local disk usage

Windows Security Best Practices:

  • Regular Updates: Keep Windows and security software updated
  • Strong Passwords: Use complex passwords and enable MFA
  • Least Privilege: Use standard user accounts for daily tasks
  • Firewall Configuration: Configure firewall rules appropriately
  • Encryption: Use BitLocker for full disk encryption
  • Regular Backups: Maintain regular backups of important data

Exam Preparation Tips

Key Areas to Focus On:

  • Defender Configuration: Know how to activate, deactivate, and update Defender
  • Firewall Management: Understand firewall profiles and rule configuration
  • User Account Types: Know differences between account types and their capabilities
  • Authentication Methods: Understand various login options and their security implications
  • File Permissions: Know NTFS vs. share permissions and inheritance
  • Encryption Technologies: Understand BitLocker, EFS, and their use cases
  • Active Directory: Know domain join, Group Policy, and user management

Practice Scenarios:

  1. Configure Windows Defender and firewall for a new computer
  2. Set up user accounts with appropriate permissions
  3. Configure BitLocker encryption for a laptop
  4. Join a computer to Active Directory domain
  5. Configure Group Policy for security settings
  6. Troubleshoot file permission issues

Summary

CompTIA A+ 1202 Objective 2.2 covers essential Windows security configuration including antivirus protection, firewall management, user account security, authentication methods, file permissions, encryption technologies, and Active Directory integration. These skills are fundamental for IT professionals securing Windows environments in business and enterprise settings. Master these concepts through hands-on practice and real-world scenarios to excel both on the exam and in your IT security career.