I want to be able to limit my workstation users to the Highest security available with the user accounts, BUT, not hindering their ability to work on their computers.
Make the user the local Administrator of their machines. Use a strong password policy, and set a defined expiration time for passwords.
Explicitly define shared folders on a server. Prevent network access to any local folder. If something needs to be used by someone else it needs to be copied to the shared folder or created there.
It's agood start and definitely one that I am going to do... However, I was thinking more along the lines of the Different User Levels, Administrator, Users, Guests, etc.
Those types of settings first and then the suggestions that you stated above.
Think more along the lines of local computer more so than Server side.
When you first create a computer, the main user is a default Administrator.
When you create a computer as a workstation for a Network, they are able to log into a Domain. Once in a domain they are given different user acounts: Administrator, Standard, User (these are the main three that they start with when setting up a computer for the network.)
Being part of the Administrator Group, gives you access to everything on the computer. Allowing you to Add, Edit and remove applications to and from your computer.
What I would like to know what groups (for Windows XP Pro) that offer the 'highest security'. That doesn't limit the user to the point where he/she cannot work efficiently on his or her computer.
I would try maybe reading this document I stumbled on and this might give you a better understanding of how things work. I understand the question as "how can I lock down a machine, but still let people do their everyday operations efficiently"
Yes, that was an amazing article that you stumbled upon, however, it was geared towards the System Administrator. I'm an Assistant Systems Administrator. So I cannot physcially access the server and make the changes to the groups.
I'm working with securing workstations to the point that a user can use the programs installed upon it including Email and the Internet, yet protect them from harming the computer indirectly.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.