• Online, Self-Paced
Course Description

In this challenge lab, you will configure user account control (UAC), configure the Windows 10 firewall, manage encryption by using Encrypted File System (EFS), and configure the anti-malware features of Windows. First, you will alter UAC configuration by using a Group Policy Object (GPO). Next, you will disable UAC by using a GPO, and then you will re-enable UAC by using a GPO. Next, you will enable network discovery and file and printer advanced sharing settings to control shared folder access, and then you will configure Windows Defender Firewall to control shared folder access. Finally, you will encrypt files by using EFS, and then you will configure and schedule antivirus scans by using PowerShell. Note: Once you begin the challenge lab, you will not be able to pause, save, or exit and then return to your challenge lab. Please ensure that you have set aside enough time to complete the challenge lab before you start.

Learning Objectives

In this challenge lab, you will configure user account control (UAC), configure the Windows 10 firewall, manage encryption by using Encrypted File System (EFS), and configure the anti-malware features of Windows. First, you will alter UAC configuration by using a Group Policy Object (GPO). Next, you will disable UAC by using a GPO, and then you will re-enable UAC by using a GPO. Next, you will enable network discovery and file and printer advanced sharing settings to control shared folder access, and then you will configure Windows Defender Firewall to control shared folder access. Finally, you will encrypt files by using EFS, and then you will configure and schedule antivirus scans by using PowerShell. Note: Once you begin the challenge lab, you will not be able to pause, save, or exit and then return to your challenge lab. Please ensure that you have set aside enough time to complete the challenge lab before you start.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.