Professional Documents
Culture Documents
Protecting The Workstation
Protecting The Workstation
attacks
Manage OS updates
Configure OS
protections
Computer
Configuration Antivirus and anti-
Guidelines spyware applications
Remove unnecessary
services, applications
Hardening computer
Malware Protection
Implement access configuration
control
2. Test antivirus
Prevent automatic downloads
download of graphics User Training Four key steps in
and audio in email deploying updated
signatures: 3. Deploy new
signatures, ensure
Don't open email proper distribution
Good practices for
attachments from
users:
strangers
4. Continue to monitor
periodaclly
Accept, open only
expected email
attachments