Windows 7 security features a large inventory of

  
With the increasing popularity of Windows 7, companies and individual users are paying more and more attention to this Microsoft's latest operating system. Let's take a look at some of the security features of Windows 7 from the security of Windows 7 system. 1. UAC (User Account Control

With the increasing popularity of Windows 7, companies and individual users are paying more and more attention to this latest Microsoft operating system. Let's start with the security of Windows 7 system. about Windows 7 security features.



1, UAC (user account control)

As we all know, UAC is Microsoft's first legacy Caozuojitong Vista, but many Vista users are very uncomfortable with UAC functionality, because UAC's ability to block unauthorized operations is very powerful, and suspicious processes are excluded from the kernel and can only be run with user permission.


Comments: Windows 7 has improved the UAC function. Under the premise of ensuring system security, minimizing the number of UAC pop-up prompts does not affect the fluency of the operation. It can be said that UAC is an important part of the Windows 7 security system. But for all Windows 7 users most often come into contact with a function.


2, BitLocker (disk lock)

BitLocker Drive Encryption technology is also new in Vista A data protection function, mainly used to solve the problem of data theft or malicious leakage caused by the loss of computer equipment. Windows 7 modified the potential cracked vulnerability of BitLocker, strengthened the TPM (Trusted Platform Module), and realized hardware-based Full disk encryption.

Comment: BitLocker's key can be saved on disk or mobile disk, and also supports print and save, suitable for enterprises or individual users with high security requirements.

3. Suite B (Encryption Support)

SuiteB is a mandatory cryptographic algorithm developed by the National Security Agency (NSA) to support government and military system secrets (SECRET) and top secret (TOP SECRET) communications. This algorithm, NSA believes that they can encourage collaboration between US domestic departments.


According to security requirements, it can be divided into 128, 256 or even higher. AES and SHA-256, with 128-bit or 256-bit keys, are designated to protect confidential information from the highest to the secret (SECRET) level. TOP SECRET information requires a 256-bit AES key combined with SHA-384.


Comment: Suite B is a very strict cryptographic algorithm, and Windows 7 adopts such high specification standards in order to improve its security.

4, Direct Access (direct access)

Direct Acces is a new feature of the 2008 R2 Windows 7 and Server. With this feature, users on the external network can directly access the resources behind the corporate firewall from the Internet at high speed and without the need to establish a VPN connection.


Direct Access VPN feature overcomes many limitations, which can be connected between the outer using IPv6 network and the company network clients connected to the server bi automatically, using IPSec performs authentication between computers.

Comment: The advantages of direct access are primarily to improve employee productivity; remote users are easier to manage; and improved security.



5, Managed Service Accounts (account management service)

Service account usually has a higher authority, also led to very It is difficult to manage it. The easiest and most common way to protect your security is to change your password frequently to avoid loss after the password is lost. However, modifying the service account is very cumbersome, so it is necessary to manage it uniformly.


Comments: Similar to DirectAccess, service account management also includes a series of operations including mode update, PowerShell2, etc. It will be more convenient to be familiar with it.

Copyright © Windows knowledge All Rights Reserved