DESKTOP

Windows 8 : Installing and Maintaining Applications - Managing Desktop Apps

10/2/2013 3:24:20 AM

Apps are new to Windows 8. Apps can be purchased in the Windows Store and installed over the Internet. They also can be developed in-house or by third-party developers and deployed using Group Policy. Although apps can be managed using techniques similar to desktop programs, apps have many distinct characteristics.

Working with Apps: The Essentials

On Windows 8, the Start screen replaces the traditional Start menu. Desktop apps are automatically added to Start when you install them and will have a Start tile. A Start tile makes it easy to start and manage the app. You can press and hold or right-click the tile to display management options. Management options for tiles depend on the type of tile. Live tiles can update their contents, and these updates can be turned on or off. Some tiles can be displayed in several sizes, and you may be able to make a tile smaller or larger. If you no longer want a tile to be displayed on Start, you can choose the Unpin From Start option.

You can start and manage apps that you unpin in several ways. One way is via the All Apps list. All Apps is the Windows 8 equivalent to the All Programs menu in earlier releases of Windows. From the Start screen, you can display All Apps by pressing and holding or right-clicking in an empty area of the Start screen and then selecting All Apps.

When working with apps and tiles, there are a few handy keyboard shortcuts, which work with desktop programs as well:

  • Windows key + Left Arrow or Right Arrow Toggles the screen snap position of the app. Snap splits the screen, so if the app is being displayed normally, Windows key + Left Arrow snaps it to the left and Windows key + Right Arrow snaps it to the right.

  • Windows key + Up Arrow Displays the app in Full Screen mode.

  • Windows key + Down Arrow Exits Screen Mode and returns the app to its original window state.

Configuring Trusted Apps and Windows Store Access

Generally, apps are installed and updated over a network or the Internet. By default, computers running Windows 8 can install only trusted app packages that come from the Windows Store. If you want to install trusted apps developed in-house or by third-party developers, you’ll need to enable the Allow All Trusted Apps To Install policy in the Administrative Templates policies for Computer Configuration under Windows Components\App Package Deployment.

You can manage user access to the Windows Store in several ways. You can:

  • Control the use of Microsoft accounts on a computer by enabling the Accounts: Block Microsoft Accounts policy. This policy is found in the Security Options policies for Computer Configuration under Windows Settings/Security Settings/Local Policies. When you enable this policy, you have two options. You can use the Users Can’t Add Microsoft Accounts setting to prevent users from creating Microsoft accounts. Or you can use the User Can’t Add Or Log On With Microsoft Accounts setting to block users from logging on with and creating Microsoft accounts.

  • Prevent users from accessing the Windows Store by enabling Turn Off The Store Application in the Administrative Templates policies for Computer Configuration under Windows Components\Store.

  • Prevent computers from automatically downloading app updates by enabling Turn Off Automatic Download Of Updates in the Administrative Templates policies for Computer Configuration under Windows Components\Store.

Enhancing Security for Apps and Overriding Default Settings

Apps run in a unique context and have a lower integrity level than desktop programs. The lower integrity level may allow apps to perform tasks that could compromise security because you’d otherwise need to provide consent to continue, and you don’t need to provide consent in these instances with apps. For example, by default, apps can open a file in a desktop program. With an unhandled file type or protocol, users see an Open With dialog box and can select a local application to open the unknown file type or protocol or use the Store service to find an application to do the same.

You can use several policies to enhance security and prevent these behaviors:

  • To prevent an app from opening a desktop program associated with a file type automatically, enable Block Launching Desktop Programs Associated With A File in the Administrative Templates policies for User Configuration or Computer Configuration under Windows Components\App Runtime.

  • To prevent an app from opening a desktop program associated with a protocol automatically, enable Block Launching Desktop Programs Associated With A Protocol in the Administrative Templates policies for User Configuration or Computer Configuration under Windows Components\App Runtime.

  • To remove the Windows Store option in the Open With dialog box, enable Turn Off Access To The Store in the Administrative Templates policies for Computer Configuration under System\Internet Communication Management\Internet Communication Settings.

It’s also important to point out that some apps can display notifications on the lock screen and that a notification history is maintained by default. The notification history allows users to log off and then log back on later and see the tile just as they did prior to logging off. To block notifications on the lock screen, enable Turn Off App Notifications On the Lock Screen in the Administrative Templates policies for Computer Configuration under System\Logon. To clear the notification history when a user logs off, enable Clear History Of Tile Notifications On Exit in the Administrative Templates policies for User Configuration under Start Menu And Taskbar.

Apps receive notifications through the Windows Push Notification Service (WNS). Live apps use WNS to update the content on their tile, to display notifications, and to receive notifications. Using Administrative Templates policies for User Configuration under Start Menu And Taskbar\Notifications you can control the use of WNS in several ways:

  • To block the display of alerts that pop up on the screen (known as toast notifications) in Windows, generally you can enable Turn Off Toast Notifications. This setting doesn’t affect taskbar notification balloons.

  • To block the display of alerts that pop up on the lock screen, you can enable Turn Off Toast Notifications On The Lock Screen.

  • To block updating of tiles and tile badges on the Start screen, you can enable Turn Off Tile Notifications.

  • To block updating of files and tile badges in the Start screen, you can enable Turn Off Tile Notifications.

  • To block apps from sending notifications for updates and alerts, you can enable Turn Off Notifications Network Usage. Enabling this setting turns off the connection Windows and WNS.

Note

REAL WORLD Microsoft tracks app usage in several ways, and you can control the tracking of app usage using the Administrative Templates policies for User Configuration under Windows Components\Edge UI.

Enhancing Networking Security for Apps

Windows 8 supports several new networking features related to applications in general and apps specifically. Windows 8 uses a feature called Windows Network Isolation to automatically discover proxies and private network hosts when a computer is connected to a domain. By default, any proxy detected is considered authoritative and any network host can be discovered via the private subnets available to the computer.

Proxy discovery and private host discovery are separate features. You control the proxy discovery process using policies in the Administrative Templates policies for Computer Configuration under Network\Network Isolation. Enable the Internet Proxy Servers For Apps policy and then enter a comma-separated list of authorized proxies that apps running on domain-connected computers can use for accessing the Internet. By default, this list of proxies is merged with the list of automatically discovered proxies. If you want only your listed proxies to be authoritative, enable Proxy Definitions Are Authoritative.

You can use the Intranet Proxy Servers For Apps policy to define authorized private network proxies. Enable this policy and then enter a comma-separated list of proxies that provide access to intranet resources. If you want only your listed proxies to be authoritative, enable Proxy Definitions Are Authoritative.

Policies in the Administrative Templates policies for Computer Configuration under Network\Network Isolation are also used to control private host discovery. Hosts discovered in this way are designated as private. Normally, private host discovery will not go across subnet boundaries.

You can enhance the discovery process by enabling the Private Network Ranges For Apps policy and then entering a comma-separated list of your company’s IPv4 and IPv6 subnets. This tells Windows about the available subnets so that they can be used for private host discovery. By default, this list of subnets is merged with the list of automatically discovered subnets. If you enable Subnet Definitions Are Authoritative, only network hosts within address ranges specific in Group Policy will be discovered and considered private.

Other  
  •  Windows Server 2003 : Managing Software Deployment with Group Policy (part 2) - Software Deployment Approaches, Distributing Windows Installer Packages
  •  Windows Server 2003 : Managing Software Deployment with Group Policy (part 1) - Software Installation Extension
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 3) - Folder Redirection Best Practices
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 2) - Policy Removal Considerations, Folder Redirection and Offline Files
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 1) - Folder Redirection, Setting Up Folder Redirection
  •  Windows 7 : Computer Management (part 2) - Shared Folders,Services
  •  Windows 7 : Computer Management (part 1) - Task Scheduler, Event Viewer
  •  Windows Server 2012 : Active Directory Domain Services Primer - Understanding Domain Trusts
  •  Windows Server 2012 : Active Directory Domain Services Primer - Outlining AD DS Components
  •  Windows Server 2012 : Active Directory Domain Services Primer - AD DS Structure - Describing AD DS Domain Trees
  •  
    Top 10
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
    Java Tutorials : Nested For Loop (part 1)
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS