15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Go applies encryption and password protection, but doesn’t require a TPM

chip. Still, every little bit counts when it comes to securing data.

Beyond Sharing Resources

As you’ve just seen, users and groups are powerful tools for authenticating

users to systems as well as authorizing NTFS permissions, but that’s not

where their power ends. There are two more areas where we use users and

groups to go beyond logging on to a system or sharing folders and files:

security policies and User Account Control. Let’s discuss security policies

first and then cover User Account Control.

Security Policies

Security policies are rules applied to users and groups to do, well, just about

everything but NTFS permissions. Would you like to configure your system

so that the Accounting group can only log on between 9 A.M. and 5 P.M.?

There’s a security policy for that. How about forcing anyone who logs on to

your system to use a password that’s at least eight characters long? There’s a

security policy for that as well. Windows provides thousands of preset

security policies that you may use simply by turning them on in a utility

called Local Security Policy.

All versions of Windows have the Local Security Policy utility. You may

access this tool through Control Panel | Administrative Tools | Local Security

Policy, but all of us cool kids just open a command line and run secpol.msc.

However you choose to access this tool, it will look something like Figure

13-36.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!