Protect Application or System SW New 2015
Protect Application or System SW New 2015
LEVEL – I
LEARNING GUIDE #6
August, 2022
#Lo1
1.1 User Account Type/Privileges
Administrator:
- Administrator accounts are special accounts that are used for making changes to
system settings or managing other people's accounts.
- They have full Control and access to every setting on the computer. Every
computer will have at least one Administrator account, and if you're the owner
you should already have a password to this account.
Standard:
- It have limited or restricted access privilege
- Standard accounts are the basic accounts you use for normal everyday tasks. As a
Standard user, you can do just about anything you would need to do, such as
running software or personalizing your desktop.
Page 2 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Standard with Family Safety:
- These are the only accounts that can have parental controls. You can create a
Standard account for each child, and then go to the Family Safety settings in
your Control Panel to set website restrictions, time limits, and more.
Guest Account:
- Windows' guest account lets other people use your computer without being able
to change PC settings, install apps or access your private files. That comes in
handy when you have to share your computer temporarily.
Every user account has an associated user account name and can have a user account picture
and a password. Any user can change the following details for his or her account:
Account name You can change the display name that appears on the Welcome screen and
Start menu.
Account picture You can change the picture that identifies you on the Welcome screen
and Start menu.
Password You can create or change the password.
Page 3 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
All types of user accounts are visible in the Family & Other Users pane. However, the
processes for managing family accounts and non-family accounts differ, so we cover them
separately in the following sections to avoid confusion.
You manage other user accounts from this pane, so the lists don’t include your account
- Only administrators can create user accounts if you’re signed in with a standard user account,
you don’t have the option to do so. When you create a user account, you must designate
whether the user is part of your family group.
- When you first add a user account, it is identified in lists by its email address or by the name
you give it. You can change the user account name (and delete user accounts) from the Users
node of the Computer Management console.
- If a person is not going to sign in to a specific computer again, it’s a good idea to delete his or
her user account. This will clean up the user account lists and recover the hard-drive space
that is used by that user’s data.
- If you don’t want to delete the user account data, you can disable the account instead of
deleting it.
Page 4 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Manage user accounts in the Computer Management console
Some user account management tasks can be completed from the Family & Other Users settings
pane, but others must be performed in the Users node of the Computer Management console.
Fig
Page 5 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
1.3. Default security policy Modification
Security policy settings are rules that administrators configure on a computer or multiple devices
for protecting resources on a device or network. The Security Settings extension of the Local
Group Policy Editor snap-in allows you to define security configurations as part of a Group Policy
Object (GPO).
The GPOs are linked to Active Directory containers such as sites, domains, or organizational units,
and they enable you to manage security settings for multiple devices from any device joined to the
domain.
Security settings policies are used as part of your overall security implementation to help secure
domain controllers, servers, clients, and other resources in your organization.
To manage security configurations for multiple devices, you can use one of the following options:
For more info about managing security configurations, see Administer security policy settings.
Page 6 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
The Security Settings extension of the Local Group Policy Editor includes the following types of
security policies:
Account Policies. These policies are defined on devices; they affect how user accounts can
interact with the computer or domain. Account policies include the following types of
policies:
Local Policies. These policies apply to a computer and include the following types of
policy settings:
o Audit Policy. Specify security settings that control the logging of security events into
the Security log on the computer, and specifies what types of security events to log
(success, failure, or both).
For devices running Windows 7 and later, we recommend to use the settings under
Advanced Audit Policy Configuration rather than the Audit Policy settings under Local
Policies.
o User Rights Assignment. Specify the users or groups that have sign-in rights or
privileges on a device
o Security Options. Specify security settings for the computer, such as Administrator
and Guest Account names; access to floppy disk drives and CD-ROM drives;
Software Restriction Policies. Specify settings to identify software and to control its ability
to run on your local device, organizational unit, domain, or site.
Application Control Policies. Specify settings to control which users or groups can run
particular applications in your organization based on unique identities of files.
Advanced Audit Policy Configuration. Specify settings that control the logging of security
events into the security log on the device. The settings under Advanced Audit Policy
Configuration provide finer control over which activities to monitor as opposed to the Audit
Policy settings under Local Policies.
Page 7 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
1.4. Displaying logon legal notices
Logon or Startup messages let you display a reminder or any important message,
every time users log into a Windows computer. As a company, some may even
choose to display legal notices on every start-up. The process of displaying a startup
Message Box in Windows 8 is basically similar to what it was in Windows 10/8/7.
You can do so via the Group Policy Editor or the Registry Editor. Let us see how to
do it!
Page 8 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
1.5. Manage email and account settings on Windows 10
E- Mail
Page 9 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
1.6. Accessing information service
Indeed, problems with service accounts are one of the top four issues that we at Quest uncover
during security assessments.
There are several types of Microsoft service accounts, each with its own advantages and
disadvantages:
Built-in service account: On a local computer, you can configure an application to run under
one of the three built-in service accounts: LocalService, NetworkService or LocalSystem. These
accounts do not have passwords.
- A traditional Microsoft service account is just a standard user account. Ideally, it should
be an account created and used exclusively to run a particular service, but all too often,
business users and admins use their regular user accounts as service accounts in the name
of expediency. Unlike the built-in service accounts, these accounts do have passwords.
However, managing the passwords of hundreds or thousands of service accounts can get
complicated very quickly, and changing a service account’s password introduces the risk
of breaking the applications or services it is used to run. Therefore, many organizations set
their service account passwords to never expire and never update them, which is not much
better than having no password at all.
- Traditional service accounts can be created like any other user account, such as with
Active Directory Users and Computers (ADUC) or your identity management solution.
Page 10 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Managed service account (MSA) or, more precisely, standalone managed service account
(sMSA) :
- In Windows Server 2008 R2, Microsoft introduced the managed service account, which
improves security by eliminating the need for an administrator to manually manage the
credentials for each service account. Instead, an sMSA establishes a complex password and
changes that password on a regular basis (by default, every 30 days).
- An sMSA cannot be shared between multiple computers (hence the modifier “standalone”).
Top 10 best practices for creating, using and managing Microsoft service accounts
Know what service accounts you have and what they are being used for.
The first step in effectively managing just about anything is to get a complete and accurate
inventory of all those things. In our case, it’s vital to identify all accounts that are being used as
service accounts, understand exactly where and how they are being used, and track key metrics
such as when their passwords were last changed.
Unfortunately, that task is far more difficult than it might initially seem. As noted earlier,
Microsoft service accounts can exist on workstations, member servers and DCs, and there are
many different types of accounts that can be used as service accounts, including regular user
accounts. With native tools, you have to go out to each of the different machines and figure out
how the applications and services on it have been configured. Doing that manually clearly is not a
feasible approach. Therefore, you’ll want to automate the scan by writing a script using the Get-
ADServiceAccount PowerShell cmdlet or by using a comprehensive enterprise security reporting
solution.
Page 11 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Operation Sheet 1
1. Select Start > Settings > Accounts and then select Family & other users. (In some versions
of Windows you'll see Other users.)
3. Select I don't have this person's sign-in information, and on the next page, select Add a
user without a Microsoft account.
4. Enter a user name, password, or password hint—or choose security questions—and then
select Next.
2. Under Family & other users, select the account owner name (you should see "Local
account" below the name), then select Change account type.
Page 12 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Page 13 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Operation Sheet 2
Operation Title : Display legal message on start-up in Windows 10 Using Windows
Registry
Purpose: To practice and demonstrate the knowledge and skill required in Deploy legal
message on start-up
Instruction: For this operation you have given 20min and demonstrate to your trainer
Tools and requirement:
- Personal Computer
Precautions: take under consideration any required Safety measures during work
Procedures used to accomplishing the task
Step 1. Press Win+R in combination to show up the ‘Run’ dialog box. In the empty field of run
dialog box, type the following keyword – regedit and hit the ‘OK’ button.
Step 2: Next, when in the ‘Registry Editor’ window, navigate to the following key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\System
Page 14 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Step 3: Under this key, you will notice two entries. It is these entries that need modification, to
activate a start-up message:
Legalnoticecaption
Legalnoticetext
Step 4: For doing so, right-click on the each of them, one after the other and choose the
‘Modify’ option.
- is first essential to understand the function of these two values. The first one, i.e.,
the legalnoticecaption value controls the title of the message. The message
appears in a large font on your computer screen.
Step 4: The second one, i.e., the legalnoticetext value, controls the body of the message. It can
be seen below the title. It is this place wherein you can enter any additional information to be
displayed in your message.
Page 15 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Operation Sheet 3
Page 16 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Step 6.Type your email account information.
Step 7.Click the Next button.
Page 17 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
#Lo2
Viruses.
File viruses.
System sector viruses.
Macro viruses.
Worms.
Trojans.
Logic bombs.
Spyware.
Harmful program
Malware, or malicious software, is any program or file that is intentionally harmful to a computer,
network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware
and spyware.
Page 18 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
- Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data.
- The main purpose of a worm is to self-replicate and propagate across the network. A virus
is a type of malicious software that needs a user to spread.
- A computer worm is a standalone malware computer program that replicates itself in order
to spread to other computers.
- It often uses a computer network to spread itself, relying on security failures on the target
computer to access it. It will use this machine as a host to scan and infect other computers.
We recommend the best products through an independent review process , and advertisers do not
influence our picks. We may receive compensation if you visit partners we recommend. Read
our advertiser disclosure for more info.
Data breaches were up 68% in 2021 compared to the previous year. Personal information such
as Social Security numbers, birth dates, bank account information, and credit card numbers is
at risk. That data is then available on the dark web and can be used to ruin your financial life.
In fact, the personal information of people with a high credit score can sell for relatively little
on the dark net.
Cyber attacks on companies are also costly . The costs for compromised records, mitigating an
attack, downtime, and repairs, and more accounted for a total cost of $4.24 million in
2021.2 Installing the right antivirus software at home or your business is one step you can take
to ensure you don't become a future statistic. Current antivirus software has moved beyond
detecting viruses to providing malware and other attack protections. With hundreds of antivirus
software solutions available, it can be hard to decide which is best for you.
Page 19 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Best Premium Option: Trend Micro Antivirus+ Security
Best Malware Scanning: Malware bytes and also you can use other antivirus soft wares for
your PC Example Avast Antivirus Software.
Page 20 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Keeping Computer Secure by configuring the following settings
There are a number of things you can do in Windows 7 to ensure your computer stays secure.
Windows Firewall
Hackers attempt to gain access to your computer by looking for vulnerabilities in your
computer’s security. This is where the firewall comes in. A firewall is a software program
or hardware that checks incoming information (such as from websites) and blocks
malicious software or attempts by hackers to gain access to your computer through a
network or the internet. A firewall will also stop you from spreading viruses to other
computers.
Page 21 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Playing It Safe
Although Windows does its best to keep your computer secure, it really does come down to
you being aware of the types of threats that exist, how they can end up on your computer,
and what you need to be aware of and can do to ensure that your computer and valuable
data stays safe.
Antivirus gives you complete control over how antivirus scans run on targeted devices, and which
options are available to end users. For example, depending on the purpose or scheduled time of an
antivirus scan, you may want to show the Antivirus client on end user devices, allow the end user
to perform antivirus scans, view and restore quarantined objects, download virus definition file
updates on their own, and so on. You can do this by creating and applying antivirus settings to a
scan task.
Whether the Antivirus icon appears in device system trays (providing end user access to
antivirus scanning, quarantine and backup viewing, and file handling tasks)
Real-time email scanning
End user right-click scans
CPU usage
Owner (to restrict access)
Scheduled antivirus scans
Quarantine/backup folder size
Restoring infected and suspicious objects
Specifying which files, folders, and file types to scan
Scan exclusions
Whether to use heuristic analysis for detecting suspicious files
Whether to scan for riskware
Real-time file protection (including which files to scan, heuristics, and exclusions)
Downloading virus definition file updates (pilot test versions, scheduled downloads, end
user download permission, and direct downloads from the security content serve
Page 22 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
2.5. Removing detected destructive software
Removing a computer virus or spyware can be difficult without the help of malicious software
removal tools. Some computer viruses and other unwanted software reinstall themselves after the
viruses and spyware are detected and removed. Fortunately, by updating the computer and by
using malicious software removal tools, you can help permanently remove unwanted software.
For more information about how to remove a computer virus and spyware, see the following
article in the Microsoft Knowledge Base: 2671662 - Microsoft resources and guidance for removal
of malware and viruses
Note A computer virus may prevent you from accessing the Microsoft Update website to install the
latest updates. We recommend that you set the Automatic Updates service to run automatically so
that a computer is not missing any important updates
Microsoft offers a free online tool that scans and helps remove potential threats from your
computer. To perform the scan, go to the Microsoft Safety Scanner website.
For more information about the Microsoft Malicious Software Removal Tool, see the following
article in the Microsoft Knowledge Base:
890830 - Remove specific prevalent malware with Windows Malicious Software Removal Tool
If the rogue security software can’t be detected or removed by using Microsoft Safety Scanner or
the Windows Malicious Software Removal Tool, try the following steps:
Microsoft Defender Offline is an anti-malware tool that helps remove difficult to eliminate viruses
that start before Windows starts. Starting with Windows 10, Microsoft Defender Offline is built in.
To use it follow the steps in this article: Help protect my PC with Microsoft Defender Offline.
Page 23 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Operation sheet 1
Step 5: Next, you’ll be presented with a window telling you that the software wants to make
changes to your system, this is a normal part of the process, so click Accept and then
an Install option should appear.
Page 24 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Before you get things underway, check for any tickboxes on the screen, as free versions can
often ask to additionally install secure web browsers, software from partners or for permission
to share your details with advertisers. These aren’t necessarily bad things, but be sure you know
what you’re agreeing to before you click Install.
When the program has finished its installation process you’ll usually be asked a few questions
regarding upgrading to other related products, but you can always do this later on or not at all.
Step 6: The last step is to run a full scan of your PC so that the new software can check that you
don’t already have any naughty programs lurking on your system.
Page 25 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Operation sheet 2
Page 26 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Operation sheet 3
Step 2: The default setting is for Avast Antivirus to notify you each time a potentially unwanted
program is installed on your PC. When Notify me about potentially unwanted
programs is ticked, you can select from the following actions:
Page 27 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Operation sheet 4
Page 28 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Step 3: Select Virus Scans.
1.
2.
3.
4.
5.
Step 4: Next, select Custom scans.
Step 6: Give a name to the scan profile, so it will be easily distinguished by other scan profiles.
Page 29 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Step 7: Select the exact day or date and Start time. Remember, Avast uses the 24-hour format.
Page 30 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
Operation sheet 5
Page 31 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
#Lo3
Spam definition
Spam is any kind of unwanted, unsolicited digital communication that gets sent out in bulk. Often
spam is sent via email, but it can also be distributed via text messages, phone calls, or social
media.
Spam is not an acronym for a computer threat, although some have been proposed (stupid pointless
annoying malware, for instance). The inspiration for using the term “spam” to describe mass
unwanted messages is a Monty Python skit in which the actors declare that everyone must eat the
food Spam, whether they want it or not. Similarly, everyone with an email address must
unfortunately be bothered by spam messages, whether we like it or not.
Types of spam
Spammers use many forms of communication to bulk-send their unwanted messages. Some of
these are marketing messages peddling unsolicited goods. Other types of spam messages can
spread malware, trick you into divulging personal information, or scare you into thinking you need
to pay to get out of trouble.
Email spam filters catch many of these types of messages, and phone carriers often warn you of a
“spam risk” from unknown callers. Whether via email, text, phone, or social media, some spam
messages do get through, and you want to be able to recognize them and avoid these threats.
Below are several types of spam to look out for.
Phishing emails
Phishing emails are a type of spam cybercriminals sends to many people, hoping to “hook” a few
people. Phishing emails trick victims into giving up sensitive information like website logins or
credit card information.
Adam Kujawa, Director of Malwarebytes Labs, says of phishing emails: “Phishing is the simplest
kind of cyberattack and, at the same time, the most dangerous and effective. That is because it
attacks the most vulnerable and powerful computer on the planet: the human mind.”
Email spoofing
Spoofed emails mimic, or spoof, an email from a legitimate sender, and ask you to take some sort
of action. Well-executed spoofs will contain familiar branding and content, often from a large
well-known company such as PayPal or Apple. Common email spoofing spam messages include:
Page 32 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
A request for payment of an outstanding invoice
A request to reset your password or verify your account
Verification of purchases you didn’t make
Request for updated billing information
Tech support scams
In a tech support scam, the spam message indicates that you have a technical problem and you
should contact tech support by calling the phone number or clicking a link in the message. Like
email spoofing, these types of spam often say they are from a large technology company like
Microsoft or a cybersecurity company like Malwarebytes.
If you think you have a technical issue or malware on your computer, tablet, or smartphone, you
should always go to the official website of the company you want to call for tech support to find
the legitimate contact information. Remote tech support often involves remote access to your
computer to help you, and you don’t want to accidentally give that access to a tech support
scammer.
Hot topics in the news can be used in spam messages to get your attention. In 2020 when the world
was facing the Covid-19 pandemic and there was an increase in work-from-home jobs, some
scammers sent spam messages promising remote jobs that paid in Bitcoin. During the same year,
another popular spam topic was related to offering financial relief for small businesses, but the
scammers ultimately asked for bank account details. News headlines can be catchy, but beware of
them in regards to potential spam messages.
Advance-fee scams
This type of spam is likely familiar to anyone who has been using email since the 90s or 2000s.
Sometimes called “Nigerian prince” emails as that was the purported message sender for many
years, this type of spam promises a financial reward if you first provide a cash advance. The sender
typically indicates that this cash advance is some sort of processing fee or earnest money to unlock
the larger sum, but once you pay, they disappear. To make it more personal, a similar type of scam
involves the sender pretending to be a family member that is in trouble and needs money, but if
you pay, unfortunately the outcome is the same.
Malspam
Short for “malware spam” or “malicious spam,” malspam is a spam message that delivers malware
to your device. Unsuspecting readers who click on a link or open an email attachment end up with
some type of malware including ransomware, Trojans, bots, info-stealers, cryptominers, spyware,
and keyloggers. A common delivery method is to include malicious scripts in an attachment of a
Page 33 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
familiar type like a Word document, PDF file, or PowerPoint presentation. Once the attachment is
opened, the scripts run and retrieve the malware payload.
Have you ever received a robocall? That’s call spam. A text message from an unknown sender
urging you to click an unknown link? That’s referred to as text message spam or “smishing,” a
combination of SMS and phishing.
If you’re receiving spam calls and texts on your Android or iPhone, most major carriers give you
an option to report spam. Blocking numbers is another way to combat mobile spam. In the US, you
can add your phone number to the National Do Not Call Registry to try to cut down on the amount
of unwanted sales calls you receive, but you should still be alert to scammers who ignore the list.
While it may not be possible to avoid spam altogether, there are steps you can take to help
Protect yourself against falling for a scam or getting phished from a spam message:
All of us can fall victim to phishing attacks. We may be in a rush and click a malicious link
without realizing. If a new type of phishing attack comes out, we may not readily recognize it. To
protect yourself, learn to check for some key signs that a spam message isn’t just annoying—it’s a
phishing attempt:
1. Sender’s email address: If an email from a company is legitimate, the sender’s email
address should match the domain for the company they claim to represent. Sometimes
these are obvious, like [email protected], but other times the changes are less
noticeable, like [email protected] instead of paypal.com.
2. Missing personal information: If you are a customer, the company should have your
information and will likely address you by your first name. A missing personal greeting
alone isn’t enough to spot a phishing email, but it’s one thing to look for, especially in
messages that say they are from a company with whom you do business. Receiving an
email that says your account has been locked or you owe money is cause to worry, and
sometimes we rush to click a link in order to fix the problem. If it’s phishing, that’s exactly
what the sender wants, so be careful and check if the email is generic or addressed
specifically to you.
3. Links: Beware of all links, including buttons in an email. If you get a message from a
company with whom you have an account, it’s wise to log in to your account to see if there
is a message there rather than just clicking the link in the message without verifying first.
You can contact the company to ask if a suspicious message is legitimate or not. If you
have any doubts about a message, don’t click any links.
Page 34 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
4. Grammatical errors: We all make them, but a company sending out legitimate messages
probably won’t have a lot of punctuation errors, poor grammar, and spelling mistakes.
These can be another red flag to indicate that the email could be suspect.
5. Too-good-to-be-true offers: Many phishing messages pretend to be from large, well-known
companies, hoping to ensnare readers who happen to do business with the company. Other
phishing attempts offer something for free like cash or a desirable prize. The saying is often
true that if something sounds too good to be true it probably is, and this can be a warning
that a spam message is trying to get something from you, rather than give you something.
6. Attachments: Unless you are expecting an email with attachments, always be wary before
opening or downloading them. Using anti-malware software can help by scanning files that
you download for malware.
You can read even more about phishing emails and how to spot them on the Malwarebytes Labs
blog.
Report spam
Email providers have gotten pretty good at filtering out spam, but when messages make it through
to your inbox, you can report them. This is true for spam calls and text messages, as many carriers
give you the ability to report spam as well. You can also choose to block the sender, often in the
same step as reporting the message.
Reporting spam can help your email provider or phone service carrier get better at detecting spam.
If legitimate emails get sent to your spam filter, you can report that they should not be marked as
spam, and that also provides useful information on what should not be filtered. Another helpful
step is to add senders you want to hear from to your contacts list proactively.
With two-factor or multi-factor authentication, even if your username and password are
compromised via a phishing attack, cybercriminals won’t be able to get around the additional
authentication requirements tied to your account. Additional authentication factors include secret
questions or verification codes sent to your phone via text message.
Install cybersecurity
In the event that you click a bad link or download malware sent to you via spam, good cyber
security software will recognize the malware and shut it down before it can do any damage to your
system or network. With products for home and business, Malwarebytes has got you covered
wherever technology takes you.
Page 35 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
3.3. Configuring Spam Filter
- Spam Filter detects spam emails based on the reputation score of the sender’s IP address. The
sender’s address is the address of the host that connects to the SMTP server to deliver an email
message, not an address within the email header.
- An email is classified as spam if the sender’s reputation is below the spam threshold, or is
classified as suspected spam if the sender’s reputation is between the spam threshold and suspected
spam threshold. An email is not classified as spam if the sender’s reputation is above the suspected
spam threshold.
Admins can view, edit, and configure (but not delete) the default anti-spam policy. For greater
granularity, you can also create custom anti-spam policies that apply to specific users, groups, or
domains in your organization. Custom policies always take precedence over the default policy, but
you can change the priority (running order) of your custom policies.
You can configure anti-spam policies in the Microsoft 365 Defender portal or in PowerShell
(Exchange Online PowerShell for Microsoft 365 organizations with mailboxes in Exchange
Online; standalone EOP PowerShell for organizations without Exchange Online mailboxes).
The spam filter policy: Specifies the actions for spam filtering verdicts and the notification
options.
The spam filter rule: Specifies the priority and recipient filters (who the policy applies to)
for a spam filter policy.
The difference between these two elements isn't obvious when you manage anti-spam polices in
the Microsoft 365 Defender portal:
When you create an anti-spam policy, you're actually creating a spam filter rule and the
associated spam filter policy at the same time using the same name for both.
When you modify an anti-spam policy, settings related to the name, priority, enabled or
disabled, and recipient filters modify the spam filter rule. All other settings modify the
associated spam filter policy.
When you remove an anti-spam policy, the spam filter rule and the associated spam filter
policy are removed.
Page 36 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software
In Exchange Online PowerShell or standalone EOP PowerShell, you manage the policy and the
rule separately. Every organization has a built-in anti-spam policy named Default that has these
properties:
The policy is applied to all recipients in the organization, even though there's no spam filter
rule (recipient filters) associated with the policy.
The policy has the custom priority value Lowest that you can't modify (the policy is always
applied last). Any custom policies that you create always have a higher priority.
The policy is the default policy (the IsDefault property has the value True), and you can't
delete the default policy.
To increase the effectiveness of spam filtering, you can create custom anti-spam policies with
stricter settings that are applied to specific users or groups of users.
In order for us to help, we will need to use the following process if you receive a spam email:
1. Forward the email to [email protected]
2. DELETE the spam email from EMC
3. Continue with the next contact
Page 37 of 37 Nefas Silk polytechnic College Hardware and Network Servicing Version -1
Level-1 August, 2022
Protect application or system software