ALL >> Computers >> View Article
Techniques For Designing Security For Client Computers

Securing client computers involves both securing the client MCTS: Windows Vista computing device (com-puter, PDA, smart phone, and so on) and locking down what users of the device can do to it and with it. This chapter will concentrate on designing a strategy to secure client computers running Microsoft Windows by using Windows tools. The following sections describe the components of the security strategy that you must think about and the techniques that you must use.
Components of a Security Strategy for Client Computers
The components of a security strategy for client computers include:
Designing an OU infrastructure for computers
Designing an OU infrastructure for users
Designing the GPO infrastructure for user and computer OUs
Designing a strategy for hardening client operating systems
Designing a strategy for restricting users
In Chapter 8, you learned how to design server security by server role. The techniques learned there can be applied to designing security for client devices and users. Ultimately, the design of secure clients ...
... must be based on a security policy but interpreted in a manner necessary for each type of client. To proceed, use the following techniques:
Separate client computers by operating system roles such as desktop or remote computers (laptops and desktops).
Group user accounts by the job that they do. Dividing client computer and user accounts in this manner allows the
Free practice exams for MCTS design to address specific types of
users and computers.
Develop Group Policy Objects (GPOs) that address the management and security concerns of each computer and user role.
Secure computer and user accounts that are not part of an Active Directory directory service infrastructure. Security templates, systems policies and scripts, as well as third-party products can be used to manage and secure these computers and the users who work with them.
Tip This lesson will not directly address client computers other than those with accounts in Active Directory; however, many of the techniques discussed can be used on stand-alone client computers.
The next sections in this lesson will address designing an OU infrastructure to sup?port this type of design. Using OUs and GPOs is the way to secure Windows clients that are members of a Windows Server 2003 or Windows 2000 domain. However, some workstations might not be joined in a Windows domain. Securing these clients will require other techniques. Techniques for securing stand alone Windows clients are addressed in Lessons 2 and 3, which present the design details for securing MCSE exams and clients, respectively.
Add Comment
Computers Articles
1. Employee Attendance System | 1 Sgd Mobile AttendanceAuthor: knani
2. Employee Mobile App For Time Attendance In Singapore
Author: knani
3. Malaysia Website Design – Rm499 For Unlimited Pages
Author: chinni rishi
4. Budget Website Design Malaysia | Rm499 & Unlimited Pages
Author: chinni rishi
5. Streamlined Attendance Tracking | Free Payroll
Author: kayakakula rishi
6. Singapore Employee App | Free Payroll | Just 1sgd
Author: kayakakula rishi
7. Biometric Fingerprint Attendance System | Free Payroll | Starting At 1sgd/mo
Author: kayakakula rishi
8. Top Web Design Agency Sg | 499sgd Unlimited Pages
Author: kayakakula rishi
9. Best Cms Web Design | Sgd 499 Nett Singapore
Author: kayakakula rishi
10. Your Web Project | Singapore | 499sgd Unlimited Pages
Author: kayakakula parvathi
11. Create Your Web Solution | Singapore | 499sgd Unlimited
Author: kayakakula parvathi
12. Tailored Virtual Security Guard Sg Plans From 30sgd
Author: chinni parvathi
13. Confined Space Management Best Practices | Free Payroll
Author: chinni parvathi
14. Zuckerberg’s Bold Ai Initiative: 5 Big Moves Unveiled
Author: Impaakt Magazine
15. Trending Technologies In Frontend Development
Author: davidjohansen