Name of Student :Aashu pasi
Name of faculty : Jyoti Mam
Name of course : JCHNE+CLOUD V1
Roll No : JK-ENR-SW-1720
Softcopy
Blog: 08
GW/TPS:01
Mindmap :03
Simulation: 07
Presentatio:09
Desktop/Laptot Security Settings
WEBSENSE
The websense lnc. Offers desktop security solutions for clients workstation laptop, and other endpoint devices to prevent from data loss inbound Wed threats. When the devices are outside corporate network.
ENDPOINT CLIENTS
- Remote Filtering Clinent.
- Websense Web Endpoint.
- Websense Data Endpoint.
REMOTE FILTERING
Websense web Filter Web Security and web Security Gateway ( anywhere) customers can use remote filtering software to monitor and filter Internet activity.
A Web Security all deployment includes Web Security. Web security Gateway and web Security Gateway Anywhere features.
In Remote filtering software
- Remote filtering clients is installed on each endpoint device.
- Remote filtering service resides inside the network and acts as a proxy to Websrnse filtering service.
WEB ENDPOINT
In Web security Gateway Anywhere deployments Websense Web Endpoint can be used to secure client machine.
- Provides transparent authentication.
- Enforce the use of hybrid filtering policies.
- Passes the authentication details to the hybrid service.
BITLOCKER
- The Bit locker is a full disk encryption tool built in Windows vista, 7,8,pro and windows 10 version as well as windows server and later
- Offers an easy secure confidential data by encrypting your drivers.
- Support AES (128 and 256-bit) encryption.
- Primarily used for whole - disk encryption.
Steps to use Bit locker :
1. Click Start , click Control Panel, click System and Security (if the control panel items are listed by category), and then click BitLocker Drive Encryption.
2. Click Turn on BitLocker.
3. turn on BitLocker
BitLocker scans your computer to verify that it meets the system requirements.
If your computer meets the system requirements, the setup wizard continues with the BitLocker.
4. message to remove CDs, DVDs, or USB drives and then shut down
Turn your computer back on after shutdown.
5. restart message
If your computer shuts down again, turn it back on.
The BitLocker setup wizard resumes atomically. Click Next.
6. BitLocker wizard resumes
When the BitLocker startup preferences page is displayed, click Require a PIN at every startup.
7. BitLocker startup preferences
Enter a PIN from 8 to 20 characters long and then enter it again in the Confirm PIN field..
8. set PIN
To store your recovery key, select Print the recovery key and then click Next.
9. select where you want to store your recovery key
Print a copy of your recovery key.
10. print recovery key
You will be prompted to restart your computer to start the encryption process. You can use your computer while your drive is being encrypted.
Question :
1. What is the Websense?
2. what is the Endpoint clients?
3. what is Remote Filtering?
4. What is the Bitlocker?
5. How many types of steps of Bitlocker?





No comments:
Post a Comment