ALL >> Computers >> View Article
Administrative Template Settings That Manage Remote Access
Two sets of Administrative Templates exist: those for computers and those for Windows 7 Exam(http://www.70-680.com)
users. Often, there are similar settings in both templates. Computer settings control the activ-ity of every user that logs on to a computer. User settings control only users whose accounts are in the OU where the settings are applied. Each user logging on to the same computer can have a different experience when user settings are used. The fol-lowing lists show an example of settings that follow this rule. Both have similar sounding settings.
The following Computer Configuration administrative template settings can be used to manage remote access:
NetMeeting Configure the Computer Configuration, Administrative Templates,Windows Components, NetMeeting setting to enable the Disable Remote Desktop Sharing setting for sensitive computer clients. This setting will prevent the use of this tool by users to share items on the desktop "with other users. Providing remoteusers access to resources on a client system in any manner is a security risk. Allowing NetMeeting desktop sharing is like giving ...
... users the right to create shares and provide unrestricted access MCTS: Windows 7 cert(http://www.70-680.com)
into the data files of their computer.
Windows Messenger Set Do Not Allow Windows Messenger To Be Run to Enabled. This prevents the use of Windows Messenger and MSN Messenger.Instant messaging applications provide access to files on the users' desktops and can serve as vectors for viruses, worms, and Trojan horses.
Terminal Services Disable the setting Allow Users To Connect Remotely Using
Terminal Services to prevent terminal services connections.
Remote Assistance If you disable the Solicited Remote Assistance setting, users will not be able to solicit remote assistance. If you disable the Offer Remote Assistance setting, no one will be able to offer remote assistance.
The following User Configuration administrative templates can be used to prevent remote access and administration of client computers.
NetMeeting In the Application Sharing folder, enable the following settings to prevent the use of any application-sharing feature. Alternatively, restrict remote access to shared application information by enabling the Prevent Control setting free practice tests(http://www.examshots.com)
but allowing some sharing through the following options:
Enable Disable Application Sharing
Enable Prevent Sharing
Enable Prevent Desktop Sharing
Enable Prevent Sharing Command Prompts
Enable Prevent Sharing Explorer Windows
Enable Prevent Control
Windows Messenger Enable the Do Not Allow Windows Messenger To Be Run setting to prevent Windows Messenger from being used. Instant messaging applications can be used to copy files to a remote desktop. These files might contain code that could allow an attacker to gain control of the desktop.
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech