Security is the basis of the Windows Vista architecture. With Windows Vista, you can connect to any user you want to connect to and do anything you want. We believe that Windows Vista can ensure the security of your information and computer.
Windows Vista security features prevent the latest threats (such as worms, viruses, and malware ). In the unlikely event of successful intrusion, Windows Vista ensures that damage is minimized.
User Account Protection
By running an application with a restricted licenseProgramWindows Vista user account protection bridges between users and management privileges. When you need to execute management tasks such as installing software or drivers, Windows Vista prompts you to determine your intention or prompt you to provide creden.
For example, if you download a Trojan horse game while you are on the road, Windows Vista can prevent the game from executing malicious tasks because the user lacks the required permissions for installation. When you need to install the printer driver for the hotel printer, Windows Vista prompts you to verify whether you really want to install the printer.
This protection combines new Protected Mode features in Internet Explorer to reduce the impact of viruses, spyware, and other types of malware (collectively referred to as "malware ").
Prevent malware impact
IT departments and individual users spend a lot of time and resources to solve malware problems and try to detect and prevent problems before they happen. Windows Vista provides powerful functions to prevent, detect, and delete malware before malware causes problems. Result: The computer performance is improved, calls are rarely supported, and the security is improved.
Protect lost, stolen, or misappropriated computers
Advanced Data Protection in Windows Vista reduces the risk of unauthorized users viewing data on a laptop or other computer, even if the laptop is lost or stolen.
Windows Vista supports full-volume encryption to prevent other operating systems from accessing files from the disk. It also stores keys in a trusted platform model (TPM) v1.2 chip. The entire system partition is encrypted, whether it is sleep files or user data.
Custom authentication mechanism
For many organizations, user name and password verification is insufficient to ensure the required security level. Windows Vista has improved Smart Card support, making it easier for developers to implement custom authentication mechanisms, such as biometric feature identification and tokens.
Network access protection
Viruses and worms can attack protected internal networks by mobile computers that have not downloaded the latest updates, security configuration settings, or virus signatures. Mobile users may connect to unprotected networks in hotels, airports, or coffee shops where their computers may be infected with malware or virus. Windows Vista provides network access protection to prevent a computer with compromised security from connecting to your internal network until it meets your security standards.
Firewall
Windows Vista provides outgoing and incoming filtering, which can be centrally managed by group policies. This allows administrators to control which applications are allowed to communicate over the network or are blocked from communicating over the network. Network access control is one of the most important ways to reduce security risks.
Windows service enhancements
In an unlikely event, intruders find and exploit vulnerable services, and Windows service enhancements limit the severity of such damages. It implements this function by preventing damaged services from modifying important configuration settings in the file system or registry or preventing them from infecting other computers on the network. For example, remote program Call (RPC) services can be prevented from replacing system files or modifying the registry.
Internet Explorer 7 enhancements
Internet Explorer 7 contains many features that can block malicious web sites and malware. The new protected mode provides Internet Explorer 7 in Windows Vista with sufficient web browsing permissions, but does not have the right to modify user settings or data without the user's consent.
To prevent phishing and spoofing attacks, Internet Explorer 7 performs the following operations:
• Highlight the address bar when a user accesses a Secure Sockets Layer protected site and allow them to easily check the validity of the site security certificate
• Contains a phishing filter. If a user is visiting a site that is known to be insecure, it will warn the user
• Allows users to clear all cached data by clicking
With Internet Explorer, users can browse more securely and securely.