123ArticleOnline Logo
Welcome to 123ArticleOnline.com!

ALL >> System-Network-Administration >> View Article

Compatible Template (compatws.inf)

By Author: Mike Jones
Total Articles: 256

Default permissions for workstations and mcse 2003 certification servers are primarily granted to three local groups: Administrators, Power Users, and Users. Administrators have the most privileges while Users have the least. Members of the Users group can successfully run applications that take part in the Windows Logo program for software, but may not be able to run applications that are not certified. If noncertified applications must be supported for members of the Users group, there are two options:
Allow members of the Users group to be members of the Power Users group.
Relax the default restrictions granted to the Users group.
Because Power Users can create users, groups, printers, and shares, some administrators would rather relax the default permissions granted to the Users group than allow members of the Users group to be members of the Power Users group. The Compatible template changes the default file and registry permissions granted to the Users group so that these members can use most noncertified applications. The Compatible template also removes all users and groups from the Power Users group, assuming that the administrator applying the Compatible template does not want end users to be Power Users.
Note Do not apply the Compatible template to domain controllers, including by mcitp enterprise administrator importing the Compatible template to the Default Domain GPO or the Default Domain Controller GPO.
Highly Secure Templates (Hisecws.inf and Hisecdc.inf)
The highly secure templates define security settings for Windows Server 2003 network communications, imposing restrictions on the levels of encryption and signing that are required for authentication and for the data that flows over secure channels and between server message block (8MB) clients and servers. These templates shut down NTLM communication and allow communication only with clients running NTLM version 2 or Kerberos. Clients that do not support NTLM version 2 include Microsoft Windows for Workgroups, Windows NT clients prior to Service Pack 4, and Microsoft Windows 95 and Microsoft Windows 98 platforms that do not have the Directory Services (DS) Client Pack installed. Microsoft Windows Me and Windows XP Professional support NTLM version 2 without additional modification.
You can import (apply) a security template file to a local or nonlocal GPO. Any computer or user accounts in the site, domain, or OU to which the GPO is applied receives the security template settings. Importing a security template to a GPO eases domain administration by Comptia security+ configuring security for multiple computers at once.

Total Views: 160Word Count: 403See All articles From Author

System/Network Administration Articles

1. Best Places To Buy Backconnect Proxy
Author: microleaves

2. The Application Delivery Network Load Balancer Market Supercharge Your Network To
Author: Pamela Sun

3. Avanu Webmux Application Delivery Load Balancing Solution
Author: Pamela Sun

4. Conflict In The Workplace: A Waste Of Time & Energy
Author: Nick Wells

5. Get Asset Management Solution Software
Author: Shophia Pena

6. Digital Library Management System - A Collection Of Content In Digital Format
Author: Anika Ahuja

7. How To Choose Employee Performance Software
Author: Engagedly Inc

8. Ccnp Training, Cisco Certified Network Professional Security Training Hyderabad - Golarsnetworks
Author: GolarsNetworks

9. Croyant Software Technologies |smart Choice For Your Business , Call Us: 7036775091
Author: sales Croyanttech

10. Ensure Better Economical End User Experience With Snmp
Author: James J. Adams

11. Browser Support Phone Number+1-844-622-1670
Author: Brendan Diamond

12. Guidelines Of Enhanced Cybersecurity And It Security Services
Author: Singhvarinder

13. Why Custom Mobile App Development Service In Texas Is The Best Bet
Author: ayokasystems

14. Check Server Health Using Snmp - In Search Of The Preeminent Tools
Author: James J. Adams

15. Want Enhanced Business Communication? Make Use Of Hosted Voip Telephony
Author: Hosted VoIP, Vertical Telephone System

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: