We can use switches to improve the security of our network. We can configure virtual LANs to define logical groups of computers. We can use MAC address filtering or port security to allow or reject frames based on the source MAC address of the device connected to the port. We can use port authentication to lock or unlock ports based upon authentication of the user or the device.
We can take advantage of restore points to recover our system, or if that doesn't help, we can restore our computer from system image to restore our computer to the point of time when we created the image.
We can take advantage of the Backup and Restore console to restore files from our existing backup, and also System Protection feature to manage and maintain our system restore points and previous versions of files and folders in our environment.
We can take advantage of the Backup and Restore tool to backup files and folders on our computer, as well as to create a complete system image of our machine in case of a need for a complete system restore.
Using an invitation file and Easy Connect we can connect to our users computers in our network to assist them by viewing their screen, giving them directions, or after they allow us to take control, to manage and maintain their machines remotely.