ALL >> Computers >> View Article
Designing A Strategy For Restricting User Access

If users can access and modify operating 70-297 Exam system features, they can destroy the computer they are working with, obtain information that might be used to attack other computers on the network, and elevate their privileges on the computer and possibly on the network. An attacker, after she gains any access to the computer, might be able to do the same. Even if these disrupting and business-crippling events do not occur, there is the potential for lost productivity and increased network maintenance costs as a result of the misconfiguration of operating system features, the presence of unap-proved third-party software, and the lack of consistency.
Users access operating system features to perform common administrative tasks. These tasks include operations such as adding and removing applications and printers, changing the configuration of an operating system feature such as networking or display, and scheduling an application or task to run at a specific time. These tasks can also include simple things such as selecting a desktop background or screen saver.
It would ...
... be easy to insist that no user should have any access to operating free CompTIA question papers system features. However, implementation of such a design would soon fail. For example, administrators and users who use laptops and are often far away from the organization's help desk maintenance technicians need the ability to do some things for themselves. Other users might work at remote sites where no administrative assistance is available. In some organizations, it is also traditional to give users choices in configuration opera?tions in the area of desktop appearance. It might be preferable in many instances to provide users the ability to perform some functions, rather than prevent them from working, or give them full administrative privileges.
A more workable strategy for restricting user access to operating system features is: 1. Place users in groups that provide limited access to operating system features.
2.Identify administrative template settings 70-680 that restrict user access to operating system features.
3.Design GPOs that restrict user access to operating system features based on client computer role and user needs.
4.Link GPOs to OUs that contain computer and user accounts that should be restricted.
5.Filter GPOs by user group as necessary.
Add Comment
Computers Articles
1. Upgrade Your Skills With The Best Business Analytics Courses In BhopalAuthor: Rohan Rajput
2. Virtual Security Guard
Author: james
3. Virtual Guard Fencing
Author: james
4. Exploring The Growth Of Mobile App Development Companies In Calgary: A 2025 Insight
Author: Josh Mark
5. Enhance Decision-making With Opentable Reviews Data Scraping
Author: DataZivot
6. How To Choose The Right Computer Repair Shop In Denver
Author: Timothy
7. Why Your 3pl Business Needs A Smarter Wms: Discover Fulfillor’s Edge
Author: Visvendra Singh
8. Top Antivirus Coupon Codes & Promo Deals
Author: Dhruv
9. Virtual Guard Video Tour & Ai Analytics System
Author: james
10. Security Incident Management
Author: james
11. Small Business Accounting Software: A Game Changer For Entrepreneurs
Author: Cecilia Robert
12. Security Guard Human Resource
Author: james
13. Guard Time And Attendance
Author: james
14. Cheap Web Design Singapore
Author: cheap
15. Video Editing Course In Hyderabad
Author: venky