123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Consider The Use Of Local Accounts

Profile Picture
By Author: unknownmem
Total Articles: 128
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In some organizations or for some servers, local accounts are used to administer the computer or the server MCSE 2003 applications. Local accounts cannot be eliminated entirely, and therefore an attacker might attempt to compromise them. An attacker with the password for a local administrator account can do a lot of damage to the data and processes running on that computer. She might also be able to use the local administrator account to elevate her privileges in the domain. To defend against an attack on local accounts, use a GPO and establish an account policy for local accounts in addition to the account policies for domain accounts.
The local Administrator account can be disabled in Windows Server 2003; how?ever, in safe mode, the local administrator account is enabled. Although booting to safe mode requires physical access to the computer, you should still assign a strong password to the
free Security+ practice exams
It is easy to get confused when talking about security policies because the ...
... term security policy is used to mean different things in different contexts. First, there is the organization's security policy. This is a collection of statements that identify the broad security concepts that all employees must follow. These statements are recorded in a document. Second, there is the security policy that can be designed and implemented by using technical controls in a Windows Server 2003-based computer, domain, and forest. These security policies are often implemented via the use of Group Policy policies, by applying security settings using Security Con?figuration and Analysis, or by directly configuring security using one of many server, domain, or server application tools. In this chapter, when the words security policy or security policies are used, they represent a reference to the written security policy document that belongs to the free practice exams for MCTS organization.

Total Views: 290Word Count: 304See All articles From Author

Add Comment

Computers Articles

1. Mcafee Installation, Troubleshooting, And Support: A Comprehensive Guide
Author: Anikethsol

2. Unleashing Brand Potential: The Role Of Advertising Agencies In Jacksonville
Author: connect agency

3. Oracle Fusion Scm Online Training Course
Author: techleadsit

4. Benefits Of Iot Based Inventory Management
Author: Sandra McCall

5. Best Mobile Games In India
Author: GWSgamingworldstudio

6. How To Recover Gmail Password If You Don't Have Recovery Number And Email?
Author: Emma

7. Poker In Your Pocket: The Rise Of Mobile Poker Game Development
Author: Antonio Thomas

8. How Scraping Hotel Pricing Data From Expedia In New York Help You Find Valuable Data?
Author: #ScrapingHotelPricingDatafromExpedia

9. Why Should You Extract Hotel Price Data From Agoda – A Leading Ota Platform
Author: #ExtractHotelPriceDatafromAgoda,

10. Streamline Your Business With Request For Quotation Software: Is It Worth The Investment?
Author: nagaraj

11. Micro Pc Tech — Best Computer Repair Services Provider
Author: Micro Pc Tech

12. Enhance Your Website's Performance With Feedify
Author: Aakash

13. Innovation In Action: Emerging Trends In Sports Betting Software Development
Author: Antonio Thomas

14. 10 App Marketing Strategies
Author: goodcoders

15. Explore The Best Refurbished Laptops: Hp, Lenovo, And Dell
Author: usedstore

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: