3. Family Safety
Family Safety has
many more uses than simply stopping your children from playing games
late at night. It can also be used to limit access to certain software
packages. You might, for instance, have some work-related software on
your home computer that you don’t want other users to access.
To access Family Safety in Windows 8, open the Start screen and type parent. In the search results in the Settings section, click Family Safety.
One new feature in Family Safety in Windows 8 is full website filtering (see Figure 7), and it’s a feature that is implemented very well, indeed.
This is a feature that can prevent children from accessing inappropriate or unsuitable websites.
The new web filter has controls to allow only websites that fall
within four categories, Child-friendly, General Interest, Online
Communication, and Warn An Adult, and it can also block file downloads.
These categories can be extremely useful in helping to prevent malware from infecting a computer.
The Windows Group
Policy Editor tool is used almost exclusively in business and corporate
IT environments, and thus, it is only available in Windows 8 Pro and
Enterprise editions. To access it, open the Start screen, type gpedit.msc, and then in the search results, click Group Policy Editor.
The Group Policy Editor interface is split into two main sections, Computer Configuration and User Configuration, and functions as follows:
-
Computer Configuration covers settings for the entire computer. You
will probably not want to change these unless, for example, you are
turning off the Windows Firewall or Windows Update in a corporate IT
environment.
-
User Configuration covers the settings that apply to specific users.
These will normally be specified remotely by a Windows Server
configuration, but if you are changing these settings within Windows 8,
you must do so on a per-user basis while logged on to that specific user
account (see Figure 8).
Each of these sections is subdivided further into Software Settings, Windows Settings, and Administrative Templates.
It is unlikely that you will ever want to change settings in Group
Policy Editor unless you are a system administrator on a company
network. However, there might be circumstances for which, to enhance
security, you want to block user access to the Run command on the Start
screen, deny user access to common Windows features such as Windows
Media Player, or change the default Windows security level for opening
email attachments.
Fortunately, all of the available options in the Group Policy Editor
are clearly labeled, and all include detailed descriptions of what
happens when you edit them. This can help you to understand how each
selection will affect you and other users on your computer so that you
can make informed choices.
Another tool used almost exclusively in business and corporate IT environments is the Local Security Policy window, which is shown in Figure 9.
This tool is more hidden than it was in Windows 7. To access it, in
the full desktop Control Panel, click Administrative Tools, and then
click Local Security Policy (see Figure 9).
There is very little that you would want to change in the Local Security Policy window. However, you can access the following two useful features:
-
Windows Firewall with Advanced Security
This is where you can set and configure specific rules to allow
hardware or software through the Windows 8 firewall. This might include
games or access to network storage.
-
Application Control Policies If you have the Enterprise or Ultimate version of Windows 8, you have access to a feature called AppLocker. This tool lets you control
what specific software can be installed on your computer, right down to
the version number. This can prove useful for features such as graphics
card drivers for games and for some plug-ins (for example, Adobe Flash)
that will work only with specific software versions. You can use this
tool to block the installation of other versions of those applications.
As with the Group Policy Editor, all of the available options in the
Local Security Policy Editor are clear and display detailed descriptions
when you click their properties. This makes it easy to understand how
each option will affect you and other users on the computer and helps
you to make informed choices.
More widely used in Windows is the Computer Management console. This is a centralized location for a wide range of useful Windows 8 settings.
The easiest and quickest way to access the Computer Management
console is to open the Start screen and press Windows logo key+X, or on
the Desktop, bring up the Administration menu and then click Computer
Management. You can see the Computer Management console, as shown in Figure 10.
The left panel of the Computer Management Console includes links to
all the relevant tools and utilities for managing your computer, but
there are some I want to highlight.
-
Task Scheduler
You might find that you want Windows 8 to run certain tasks on a set
schedule, such as disk cleanup. You can set any task or program to run on a schedule you define by clicking Task Scheduler in the Computer Management console.
-
Event Viewer This is a useful tool for viewing error and other reports from the operating system.
-
Shared Folders You can use Shared Folders to permit and deny access to folders that are shared between users on the same computer or across different computers in a home network.
5. Blocking CDs, DVDs, Flash Drives, and External Hard Disks
One of the biggest security problems—certainly one of the biggest in
the corporate space—is the use of external flash drives, CDs, DVDs, and
external hard disks. If not carefully vetted, these media can transfer
viruses and other malware to a computer or be used to steal information.
This is because although computer equipment within an organization can
be controlled by using group and security policies, external hardware,
especially personal flash drives, is not subject to the same rules and
could also be used on a third-party or home computer with little or no
virus and malware protection. You can use Group Policy Editor to deny
access to these devices for specific users or for everyone.
To access the Removable Storage Access settings in the Group Policy Editor (see Figure 11), click Computer Configuration, click User Configuration, and then click Administrative Templates and System.
Note
USB flash drives and external hard disks are classified as removable disks. To allow or deny access
to a wide range of plug-in drives, right-click any of the settings,
click Edit, and then click Disable to block access to the selected group
of drives.
It can be argued that no user should ever be allowed to use a
computer because then nothing can go wrong with it. In practice,
however, it is in how individual and groups of users are managed on the
computer that can make the difference between a stable and reliable
system and one riddled with problems and malware.
As always though, the key to avoiding
problems with users is in training and awareness. For users who will
just use the Start screen and new Apps, problems can be minimized
further. With Windows 8, however, this is an inevitable learning curve,
and effective training is needed in conjunction with user and group
management to preclude problems.