Monday, June 17, 2019

Windows 7 Workgroup Consultation for Sally Chu Assignment

Windows 7 Workgroup Consultation for Sally Chu - Assignment ExampleKeywords UAC, user door controls, administrative users, users, Windows 7, workgroup, network Windows 7 Workgroup Consultation for Sally Chu In methodicalness for Sally to grant all six of her administrative staff members the same computer-access privileges, to allow them to run applications and use network printers, but not be sufficient to make whatever accidental changes that can adversely affect their computers, the most effective and efficient way to create user accounts for these employees would be as follows. The source step would be to setup the profile for Sallys administrators. In order to ensure that the administrators cannot make any changes that would adversely affect the computers themselves, the best face is to setup the administrators on a standard user profile, instead of an administrator profile, as the administrator profile would have complete access to make any and all changes, while the stand ard use can use most software and change system settings that do not affect other users or the pledge of the computer itself. erst the standard user is setup, the next step is to setup the parental controls for that standard user, allowing for the use of games to be filtered out, and blocking any peculiar(prenominal) programs that she does not want the administrators to have access to, by setting the profile to just be able to use the programs from an allowed list, as specified by herself. Once the account is setup, and the parental controls are put in place, the settings in UAC, or User Account Controls, would need to be set, providing notification when programs try to make changes to the computer. This mustiness be done for each profile that needs to be created, for a total of six (Microsoft, 2013). As Sally would like to provide a racy level of authentication for her networks users, she would like a dual authentication process. Two of the different methods that she could us e in conjunction with requiring a war cry for network access are the option to use EAP (Extensible Authentication Protocol), and setting to allow certain protocols. Selecting Use Extensible Authentication Protocol allows the selection of exploitation one of three protocols for authenticating the VPN alliance Protected EAP (PEAP), EAP-MSCHAPv2, or Smart Card or Other Certificate all three options will ensure the security and data integrity of the EAP conversation through the use of encryption. The default setting is EAP-MSCHAPv2, which is also known as Secure Password. By selecting the properties for EAP-MSCHAPv2, the ability to configure the nexus to use the Windows login credentials in order to authenticate the connection. Selecting Allow These Protocols instead as the other alternative for providing the second level of security to the network connection will allow for the choice between three different connection types, all of which can be set to configure the Windows login cr edentials to be apply the three different authentication protocols that can be used by the connection are PAP, CHAP, or MS-CHAPv2. The choice of these three types of authentication methods will only apply to PPTP, L2TP/IPsec, or SSTP tunnels IKEv2 tunnels can only use EAP-MSCHAPv2 or certificates as their authentication methods (Sourcedaddy.com, 2008). While there is an advantage into having the users use their Windows login credentials, namely that they will not have to remember a third set of login credentials, the disadvantage is that if an unauthorized user obtains that information, that will give them that much more access to the network itself. The user access controls set for the profiles themselves will ensure that the web based applications will run in protected mode, and by allowing the particular programs on the intranet in the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.