ALL >> Computers >> View Article
Designing A Strategy For Restricting User Access
If users can access and modify operating 70-297 Exam system features, they can destroy the computer they are working with, obtain information that might be used to attack other computers on the network, and elevate their privileges on the computer and possibly on the network. An attacker, after she gains any access to the computer, might be able to do the same. Even if these disrupting and business-crippling events do not occur, there is the potential for lost productivity and increased network maintenance costs as a result of the misconfiguration of operating system features, the presence of unap-proved third-party software, and the lack of consistency.
Users access operating system features to perform common administrative tasks. These tasks include operations such as adding and removing applications and printers, changing the configuration of an operating system feature such as networking or display, and scheduling an application or task to run at a specific time. These tasks can also include simple things such as selecting a desktop background or screen saver.
It would ...
... be easy to insist that no user should have any access to operating free CompTIA question papers system features. However, implementation of such a design would soon fail. For example, administrators and users who use laptops and are often far away from the organization's help desk maintenance technicians need the ability to do some things for themselves. Other users might work at remote sites where no administrative assistance is available. In some organizations, it is also traditional to give users choices in configuration opera?tions in the area of desktop appearance. It might be preferable in many instances to provide users the ability to perform some functions, rather than prevent them from working, or give them full administrative privileges.
A more workable strategy for restricting user access to operating system features is: 1. Place users in groups that provide limited access to operating system features.
2.Identify administrative template settings 70-680 that restrict user access to operating system features.
3.Design GPOs that restrict user access to operating system features based on client computer role and user needs.
4.Link GPOs to OUs that contain computer and user accounts that should be restricted.
5.Filter GPOs by user group as necessary.
Add Comment
Computers Articles
1. 10 Dropshipping Shopify Apps For Shopify Stores 2025Author: Elightwalk Technology
2. How To Write A Great Creative Ux Brief For A Design Consultancy
Author: goodcoders
3. How To Market Your Gojek Clone App Effectively
Author: simonharris
4. Scrape Restaurant Guru Review Data: Unlock Actionable Insights
Author: DataZivot
5. How To Make A Rental Search App To Solve Tenants’ Problems?
Author: goodcoders
6. Is The Is200ehpag1d Exciter Gate Pulse Amplifier Board The Ideal Choice For Your Power System Needs?
Author: Alex Zilk
7. Document Management System For Clinical Trials
Author: Giselle Bates
8. Vupico Sdp
Author: Lorenzoe Taala
9. An Extensive Guide On E-commerce Application Development
Author: goodcoders
10. Why Do Your Businesses Need Vehicle Rental Management Software In 2025?
Author: RentAAA
11. Exploring Bigpond A Reliable Choice For Your Internet Needs
Author: james smith
12. Elevate Your Online Presence With Leading Digital Marketing Solutions In Surat
Author: sassy infotech
13. How To Power Several Appliances Together Safely?
Author: Jennifer Truong
14. Web Scraping Zomato Restaurant Customer Reviews
Author: DataZivot
15. Why Every Coworking Space Needs Management Software To Thrive
Author: RentAAA