123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Designing A Strategy For Restricting User Access

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

If users can access and modify operating 70-297 Exam system features, they can destroy the computer they are working with, obtain information that might be used to attack other computers on the network, and elevate their privileges on the computer and possibly on the network. An attacker, after she gains any access to the computer, might be able to do the same. Even if these disrupting and business-crippling events do not occur, there is the potential for lost productivity and increased network maintenance costs as a result of the misconfiguration of operating system features, the presence of unap-proved third-party software, and the lack of consistency.

Users access operating system features to perform common administrative tasks. These tasks include operations such as adding and removing applications and printers, changing the configuration of an operating system feature such as networking or display, and scheduling an application or task to run at a specific time. These tasks can also include simple things such as selecting a desktop background or screen saver.
It would ...
... be easy to insist that no user should have any access to operating free CompTIA question papers system features. However, implementation of such a design would soon fail. For example, administrators and users who use laptops and are often far away from the organization's help desk maintenance technicians need the ability to do some things for themselves. Other users might work at remote sites where no administrative assistance is available. In some organizations, it is also traditional to give users choices in configuration opera?tions in the area of desktop appearance. It might be preferable in many instances to provide users the ability to perform some functions, rather than prevent them from working, or give them full administrative privileges.
A more workable strategy for restricting user access to operating system features is: 1. Place users in groups that provide limited access to operating system features.
2.Identify administrative template settings 70-680 that restrict user access to operating system features.
3.Design GPOs that restrict user access to operating system features based on client computer role and user needs.
4.Link GPOs to OUs that contain computer and user accounts that should be restricted.
5.Filter GPOs by user group as necessary.

Total Views: 311Word Count: 362See All articles From Author

Add Comment

Computers Articles

1. 10 Dropshipping Shopify Apps For Shopify Stores 2025
Author: Elightwalk Technology

2. How To Write A Great Creative Ux Brief For A Design Consultancy
Author: goodcoders

3. How To Market Your Gojek Clone App Effectively
Author: simonharris

4. Scrape Restaurant Guru Review Data: Unlock Actionable Insights
Author: DataZivot

5. How To Make A Rental Search App To Solve Tenants’ Problems?
Author: goodcoders

6. Is The Is200ehpag1d Exciter Gate Pulse Amplifier Board The Ideal Choice For Your Power System Needs?
Author: Alex Zilk

7. Document Management System For Clinical Trials
Author: Giselle Bates

8. Vupico Sdp
Author: Lorenzoe Taala

9. An Extensive Guide On E-commerce Application Development
Author: goodcoders

10. Why Do Your Businesses Need Vehicle Rental Management Software In 2025?
Author: RentAAA

11. Exploring Bigpond A Reliable Choice For Your Internet Needs
Author: james smith

12. Elevate Your Online Presence With Leading Digital Marketing Solutions In Surat
Author: sassy infotech

13. How To Power Several Appliances Together Safely?
Author: Jennifer Truong

14. Web Scraping Zomato Restaurant Customer Reviews
Author: DataZivot

15. Why Every Coworking Space Needs Management Software To Thrive
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: