SECURITY

Implementing Security in Windows 7 : Check Action Center for Security Problems

8/14/2012 5:54:33 PM
In Windows 7, the new Action Center displays messages about the current state of your PC. In particular, Action Center warns you if your computer has any current security problems.

For example, the Action Center tells you if your PC does not have virus protection installed, or if the Windows Defender spyware database is out of date or turned off. Action Center also warns you if User Account Control is turned off or if the Windows Firewall is deactivated.

Check Action Center for Security Problems

1 Click Start.

2 Click Control Panel.

The Control Panel window appears.

3 Click Review your computer's status.

The Action Center window appears.

4 Review the messages in the Security section.

5 Click a message button to resolve the security issue, such as clicking Update now if Windows Defender is out of date.

6 Click Security.



7 Scroll down the Action Center window.

• Action Center displays a summary of all your system's security settings.



Simplify It

Is there a quicker way to see Action Center messages?

Yes, you can view Action Center messages and open the Action Center more quickly by following these steps:

1 Click the Action Center icon () in the taskbar's notification area.

• The current Action Center messages appear here.

2 To launch Action Center, click Open Action Center.



Other  
  •  Implementing Security in Windows 7 : Understanding Windows 7 Security
  •  Programming COM+ Security (part 3) - Compiling and Installing the COM+ Application
  •  Programming COM+ Security (part 2) - Creating the Serviced Component, Specifying the COM+ Application Type
  •  Programming COM+ Security (part 1) - Creating the Serviced Component, Specifying the COM+ Application Type
  •  COM+ Security : COM+ Security Explained
  •  Password Hacks (Part 3) - Alternatives to passwords
  •  Password Hacks (Part 2) - Criminal activity
  •  Password Hacks (Part 1) - Stop Thieves Taking Data And Protect Yourself
  •  Programming .NET Security : Using the Code-Access Security Policy Tool (part 2) - Evaluating Security Policy
  •  Programming .NET Security : Using the Code-Access Security Policy Tool (part 1) - Administering Policy Levels
  •  
    Top 10
    Review : Sigma 24mm f/1.4 DG HSM Art
    Review : Canon EF11-24mm f/4L USM
    Review : Creative Sound Blaster Roar 2
    Review : Philips Fidelio M2L
    Review : Alienware 17 - Dell's Alienware laptops
    Review Smartwatch : Wellograph
    Review : Xiaomi Redmi 2
    Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
    Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8