Task Manager is a tool commonly used to manage applications and processes running on a computer. There are now four tabs within the Task Manager window instead of two as seen with NT and the three with Windows 2000. The Applications tab serves to display all of the active applications on the system. Services and application-spawned processes will not appear with this tab. The Processes tab, however, will display all processes running on the server – applications, processes, and services.
From within either the Applications or the Processes tab, you have the ability to stop an entry. This doesn’t mean that you can always do so successfully. Many applications will spawn multiple processes which are wither system-protected, or so interrelated that stopping an application or process is impossible to do without compromising system integrity. When this happens, you will either be presented with a message indicating that the app/process cannot be stopped, or a cycle of messages that amount to the same thing.
Continue reading “Exam 70-270 – Understanding Task Manager”
Internet Explorer connection properties are used to configure how the Web browser will connect to the Internet.
The Connections tab will available from the Internet Options dialog box will list any Internet connections currently configured on the computer, including dial-up and Virtual Private Network (VPN) connections. If a connection to the Internet is through a proxy server, you can use the Settings button to configure the required proxy settings. These settings are summarized in the table below.
Continue reading “Exam 70-272 – Configuring Internet Explorer (Part III)”
A cookie is a small text file that is stored on your computer’s hard drive by a Web server. The text file stores personalized information about your visit to a Web site. The Web server can then read the text file the next time you return to the Web site and use the information to deliver personalized content. For example, there are several Web sites that deliver the latest news stories, but deliver local news when you access their site. Or those sites that provide you with the local weather forecast for your area.
Continue reading “Exam 70-272 – Configuring Internet Explorer (Part II)”
Exam 70-270 Installing, Configuring, and Administering Microsoft Windows XP Professional (as well as exams 70-271 and 70-272) requires you to know how to configure Internet Explorer options. There are several tabs available from the Internet Options dialog box. The three that you should focus your attention on are the Security, Privacy, and Connections tabs.
For security purposes, Internet Explorer allows you to place Web sites into different zones. Specific actions can then be performed on Web sites based on the zone it has been placed in. The Security tab available from the Internet Options dialog box displays four separate zones.
Continue reading “Exam 70-270 – Configuring Internet Explorer (Part I)”
User profiles allow a user to keep their personalized settings so they do not have to reconfigure their computer each time they log onto the computer. However, if you want users to have a pre-configured desktop environment, you can assign a mandatory user profile. The procedure for implementing this is described below.
If you want to implement a mandatory profile that is stored on the network, your first step is to create a shared folder that will store the mandatory user profile. Open the Computer Management console on the computer that will hold the profile. Create a shared folder and assign Everyone full control. You can then proceed to the following steps that involve copying the user profile you want to become mandatory to the shared folder.
Continue reading “Exam 70-270 – Understanding User Profiles (Part II)”
User Profiles often pop up as a popular exam topic and they are often used in the workplace. So here are a few things about user profiles that you should understand.
First of all, there are three different types of user profiles that include: local user profiles, roaming user profiles, and mandatory user profiles. The type of profile you implement will depend on many things including network configuration.
User profiles contain objects such as a user’s desktop, icons, start menu items, and other ‘interface-related’ objects. This is the most common definition of the term. Profiles also contain registry information, along with folders containing IE favorites, temp files, My Documents, and others. Local profiles are stored within the \Documents and Settings folder under the username, Profiles contain a lot of information, including portions of the registry, and other system files that are normally hidden from view. Local profiles offer a measure of security in that the data is not open or readily available to or over the network. Unfortunately, should the server or system fail, there is no quick way to recover any users profiles outside of performing a tape restore. Remember that the overall security umbrella includes data availability.
Continue reading “Exam 70-270 – Understanding User Profiles (Part I)”
In the previous installment of this article, you learned how to configure a Password Policy in Windows XP through the Local Security Policy. In this installment, you learn how to configure an Account Lockout Policy.
As with implementing a Password Policy, another way in which you can secure your computer is to enable an Account Lockout Policy. This eliminates the ability for someone to sit down at your computer and continuously attempt to guess your user name and password. The Account Lockout Policy settings in Windows XP include the following:
Continue reading “Exam 70-270 – Account Policies (Part II)”
The Account Policies in Windows XP consist of two different components. There is a Password Policy and an Account Lockout Policy. Both can be used to increase security on a Windows XP computer.
You can access the Password Policy settings through the Local Security Policy. The settings include:
- Enforce password history
- Maximum password age
- Minimum password age
- Minimum password length
- Password must meet complexity requirements
- Store password using reversible encryption for all users in the domain
Continue reading “Exam 70-270 – Account Policies (Part I)”
Giving a user administrative privilege means that user now has full control over your computer. Normally when you are considering user rights and permissions, you should follow the principle of least privilege. This means only assign a user the minimal amount of rights and permissions for them to perform their required tasks. For example, if you want to give a user the right to backup files and directories you could add the user to the Administrators group. However, this goes against the principle of least privilege. A more appropriate solution would be to add the user to the Backup Operators group. You can do so using the following steps:
Continue reading “Grant A User Permission To Perform Backups (2k/XP/2003)”
It is always recommended that users be forced to change their password to increase security. You can force users to change their password at a specific interval, such as every 30 days. You can configure this behavior by editing the local security policy.
- Click Start and select Control Panel.
- Double click Administrative Tools.
- Double click Local Security Policy.
- Expand Account Policies and select Password Policy.
- In the details pane, double click Maximum password age.
- Use the arrow and set the value to 30 days.
- Click OK.
You can also ensure that users keep the same password for a minimum number of days by changing the Minimum password age. Complete steps 1 through 4 and double click Minimum password age in the details pane.
[tags]diana huggins,password change,administrative tools,local security policy,password policy,maximum password age[/tags]