ALL >> Computers >> View Article
Designing A Strategy For Restricting User Access
If users can access and modify operating 70-297 Exam system features, they can destroy the computer they are working with, obtain information that might be used to attack other computers on the network, and elevate their privileges on the computer and possibly on the network. An attacker, after she gains any access to the computer, might be able to do the same. Even if these disrupting and business-crippling events do not occur, there is the potential for lost productivity and increased network maintenance costs as a result of the misconfiguration of operating system features, the presence of unap-proved third-party software, and the lack of consistency.
Users access operating system features to perform common administrative tasks. These tasks include operations such as adding and removing applications and printers, changing the configuration of an operating system feature such as networking or display, and scheduling an application or task to run at a specific time. These tasks can also include simple things such as selecting a desktop background or screen saver.
It would ...
... be easy to insist that no user should have any access to operating free CompTIA question papers system features. However, implementation of such a design would soon fail. For example, administrators and users who use laptops and are often far away from the organization's help desk maintenance technicians need the ability to do some things for themselves. Other users might work at remote sites where no administrative assistance is available. In some organizations, it is also traditional to give users choices in configuration opera?tions in the area of desktop appearance. It might be preferable in many instances to provide users the ability to perform some functions, rather than prevent them from working, or give them full administrative privileges.
A more workable strategy for restricting user access to operating system features is: 1. Place users in groups that provide limited access to operating system features.
2.Identify administrative template settings 70-680 that restrict user access to operating system features.
3.Design GPOs that restrict user access to operating system features based on client computer role and user needs.
4.Link GPOs to OUs that contain computer and user accounts that should be restricted.
5.Filter GPOs by user group as necessary.
Add Comment
Computers Articles
1. Expert Ppc Services In PuneAuthor: Brandrisic Media
2. The Future Of Online Medicine Delivery Apps In 2025
Author: simonharris
3. Where Can I Book A Doorstep Laptop Repair Service?
Author: Smita Join
4. Unlocking Business Potential With It Services And Lexington Managed Services
Author: naviworld1h
5. Top 5 Workflow Automation Software Of 2025
Author: Ben Gross
6. Ensuring Medication Safety With Tempgenius: Medication Temperature Monitor And Remote Temperature Probe
Author: Chris Miller
7. Spiral Model Sdlc: Top Choice For Large, High-risk Software Projects?
Author: goodcoders
8. How To Develop An Employee Scheduling App Like Hotschedules?
Author: goodcoders
9. How To Build A User-friendly Mobile Website? 10 Super Tips From Experts
Author: goodcoders
10. How To Choose The Right Refurbished Desktop For Your Needs: A Buyer’s Guide
Author: Scogo Store
11. Why Choose Refurbished Laptops Over New Ones In 2025?
Author: Scogo Store
12. Cloud Computing Trends 2025
Author: Ben Gross
13. Gst-billing-software
Author: Priyanka Patil
14. Digital Transformation In Higher Ed: Leveraging Crm For Student Recruitment
Author: E2S Team
15. How To Contact Sbcglobal Email Support: A Step-by-step Guide
Author: SBCGlobalInfo