Wednesday, May 2, 2012

Securing Data on Client Computers Part Three

·        This method disables a file, which is determined by its hash value.
·        You can also disable files & programs using different methods such as path, certificate, and internet zone rules.  A path rule specifies a certain path, such as C:\Windows, and does not let the user access any files in these directories.
·        It’s important to hide and disable any programs you don’t want unauthorized users to use. Generally student accounts and most restrictive and are only given the most basic permissions.
·        Hiding programs from the start menu is also one important step in securing a client computer. This is combination with many other security measures can help insure the safety of your files and network security.
Folder and File Permissions
·         At some point you will want to restrict access to certain folders and files within these folders. This process can be done rather simply.
·         Right click the folder you want to configure permissions for and select properties. Click the security tab to bring up the groups and users that have access.

·         From here you can select the group or user you want and assign them permissions. You can give them several permissions including full control or ready-only access.
·         In most cases when creating a shared folder on a network, you will want to limit the access to read-only unless you are an administrator or a user who can contribute to the folder. You may also want to consider setting a disk quota so users do not fill the entire storage device.
·         Clicking the advanced tab brings up more settings. You can determine inheritance and further fine tune the permission settings. 

No comments:

Post a Comment