123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Designing A Strategy For Restricting User Access

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

If users can access and modify operating 70-297 Exam system features, they can destroy the computer they are working with, obtain information that might be used to attack other computers on the network, and elevate their privileges on the computer and possibly on the network. An attacker, after she gains any access to the computer, might be able to do the same. Even if these disrupting and business-crippling events do not occur, there is the potential for lost productivity and increased network maintenance costs as a result of the misconfiguration of operating system features, the presence of unap-proved third-party software, and the lack of consistency.

Users access operating system features to perform common administrative tasks. These tasks include operations such as adding and removing applications and printers, changing the configuration of an operating system feature such as networking or display, and scheduling an application or task to run at a specific time. These tasks can also include simple things such as selecting a desktop background or screen saver.
It would ...
... be easy to insist that no user should have any access to operating free CompTIA question papers system features. However, implementation of such a design would soon fail. For example, administrators and users who use laptops and are often far away from the organization's help desk maintenance technicians need the ability to do some things for themselves. Other users might work at remote sites where no administrative assistance is available. In some organizations, it is also traditional to give users choices in configuration opera?tions in the area of desktop appearance. It might be preferable in many instances to provide users the ability to perform some functions, rather than prevent them from working, or give them full administrative privileges.
A more workable strategy for restricting user access to operating system features is: 1. Place users in groups that provide limited access to operating system features.
2.Identify administrative template settings 70-680 that restrict user access to operating system features.
3.Design GPOs that restrict user access to operating system features based on client computer role and user needs.
4.Link GPOs to OUs that contain computer and user accounts that should be restricted.
5.Filter GPOs by user group as necessary.

Total Views: 348Word Count: 362See All articles From Author

Add Comment

Computers Articles

1. Employee Attendance System | 1 Sgd Mobile Attendance
Author: knani

2. Employee Mobile App For Time Attendance In Singapore
Author: knani

3. Malaysia Website Design – Rm499 For Unlimited Pages
Author: chinni rishi

4. Budget Website Design Malaysia | Rm499 & Unlimited Pages
Author: chinni rishi

5. Streamlined Attendance Tracking | Free Payroll
Author: kayakakula rishi

6. Singapore Employee App | Free Payroll | Just 1sgd
Author: kayakakula rishi

7. Biometric Fingerprint Attendance System | Free Payroll | Starting At 1sgd/mo
Author: kayakakula rishi

8. Top Web Design Agency Sg | 499sgd Unlimited Pages
Author: kayakakula rishi

9. Best Cms Web Design | Sgd 499 Nett Singapore
Author: kayakakula rishi

10. Your Web Project | Singapore | 499sgd Unlimited Pages
Author: kayakakula parvathi

11. Create Your Web Solution | Singapore | 499sgd Unlimited
Author: kayakakula parvathi

12. Tailored Virtual Security Guard Sg Plans From 30sgd
Author: chinni parvathi

13. Confined Space Management Best Practices | Free Payroll
Author: chinni parvathi

14. Zuckerberg’s Bold Ai Initiative: 5 Big Moves Unveiled
Author: Impaakt Magazine

15. Trending Technologies In Frontend Development
Author: davidjohansen

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: