SlideShare a Scribd company logo
Module 6: Configuring
User Account Security
Overview
Configuring User Account Control
Troubleshooting User Account Control
Lesson 1: Configuring User Account Control
What Is User Account Control?
What Do Standard User Privileges Do?
Authorize an Application by Using the Compatibility Tab
Demonstration: Configuring User Account Control
What Is User Account Control?
Reduces Exposure and Attack Surface
Applications Run With Least Privilege
Application Permissions Can Be Elevated
What Do Standard User Privileges Do?
Remove the Need to Run Tasks as Administrator
Grant Additional Privileges to Perform Specific Tasks
Provide Additional Services to Perform Tasks
Deprecate Power Users Group
Authorize an Application by Using the
Compatibility Tab
Individual User
All Users
Demonstration: Configuring User Account Control
In this demonstration, you will see how to:
Respond to a UAC permission request
Run an application as an administrator
Configure an application to always run
as administrator
Lesson 2: Troubleshooting User Account Control
Administrative Approval Mode
User Account Control Panel
Demonstration: Troubleshooting User Account Control
Administrator Approval Mode
Administrators Run as Standard Users
Prevents Malicious Software from Running Unnoticed
Controlled By Policy
User Account Control Panel
Change Account Properties
Give Domain Users Access
Advanced Settings
Turn Off UAC
Demonstration: Troubleshooting User Account
Control
In this demonstration, you will see how to:
Change an account type
Configure UAC policy settings
Disable UAC
Lab: Configuring User Account Security
Exercise 1: Requesting an Application to
Run Elevated One Time
Exercise 2: Marking an Application to
Always Run Elevated
Exercise 3: Configuring User Account
Control Panel

More Related Content

Similar to Module 6 configuring user account security

Advanced Permissions: Magento Extension by Amasty. User Guide.
Advanced Permissions: Magento Extension by Amasty. User Guide.Advanced Permissions: Magento Extension by Amasty. User Guide.
Advanced Permissions: Magento Extension by Amasty. User Guide.
Amasty
 
“Elemental elements”
“Elemental elements”“Elemental elements”
“Elemental elements”
rolly fahdial
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!
Cireson
 
How to Write Test Cases in Software Testing? A Step-by-Step QA Guide
How to Write Test Cases in Software Testing? A Step-by-Step QA GuideHow to Write Test Cases in Software Testing? A Step-by-Step QA Guide
How to Write Test Cases in Software Testing? A Step-by-Step QA Guide
Minuscule Technologies
 
Online examination system
Online examination systemOnline examination system
Online examination system
Narendra Sonone
 
Viewfinity Product Overview
Viewfinity Product OverviewViewfinity Product Overview
Viewfinity Product Overview
akeophila
 
Beyond Roles: A Practical Approach to Enterprise User Provisioning
Beyond Roles: A Practical Approach to Enterprise User ProvisioningBeyond Roles: A Practical Approach to Enterprise User Provisioning
Beyond Roles: A Practical Approach to Enterprise User Provisioning
Hitachi ID Systems, Inc.
 
Software Testing presentation
Software Testing presentationSoftware Testing presentation
Software Testing presentationRazia Sultana
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmtodanyboy
 
Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...
ScriptLogic
 
UAT User Acceptance Technology
UAT User Acceptance TechnologyUAT User Acceptance Technology
UAT User Acceptance Technology
EeshAftab
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
Dipankar Boruah
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1waqar younas
 
Vb net xp_14
Vb net xp_14Vb net xp_14
Vb net xp_14Niit Care
 
B4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteriaB4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteria
b4usolution .
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
Guang Ying Yuan
 
software testing methodologies
software testing methodologiessoftware testing methodologies
software testing methodologies
Jhonny Jhon
 
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptxFITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
sikhaverma3
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Sangeetha Rangarajan
 

Similar to Module 6 configuring user account security (20)

Advanced Permissions: Magento Extension by Amasty. User Guide.
Advanced Permissions: Magento Extension by Amasty. User Guide.Advanced Permissions: Magento Extension by Amasty. User Guide.
Advanced Permissions: Magento Extension by Amasty. User Guide.
 
“Elemental elements”
“Elemental elements”“Elemental elements”
“Elemental elements”
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!
 
How to Write Test Cases in Software Testing? A Step-by-Step QA Guide
How to Write Test Cases in Software Testing? A Step-by-Step QA GuideHow to Write Test Cases in Software Testing? A Step-by-Step QA Guide
How to Write Test Cases in Software Testing? A Step-by-Step QA Guide
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Viewfinity Product Overview
Viewfinity Product OverviewViewfinity Product Overview
Viewfinity Product Overview
 
Beyond Roles: A Practical Approach to Enterprise User Provisioning
Beyond Roles: A Practical Approach to Enterprise User ProvisioningBeyond Roles: A Practical Approach to Enterprise User Provisioning
Beyond Roles: A Practical Approach to Enterprise User Provisioning
 
Software Testing presentation
Software Testing presentationSoftware Testing presentation
Software Testing presentation
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmt
 
Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...
 
UAT User Acceptance Technology
UAT User Acceptance TechnologyUAT User Acceptance Technology
UAT User Acceptance Technology
 
Group 9 SRS
Group 9 SRSGroup 9 SRS
Group 9 SRS
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1
 
Vb net xp_14
Vb net xp_14Vb net xp_14
Vb net xp_14
 
B4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteriaB4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteria
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
software testing methodologies
software testing methodologiessoftware testing methodologies
software testing methodologies
 
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptxFITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 

More from xeroxk

Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
xeroxk
 
Hiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên PhotoshopHiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên Photoshopxeroxk
 
Powerpoint 2010
Powerpoint 2010Powerpoint 2010
Powerpoint 2010xeroxk
 
Một Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh TếMột Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh Tếxeroxk
 
Xây Dựng Thương Hiệu
Xây Dựng Thương HiệuXây Dựng Thương Hiệu
Xây Dựng Thương Hiệuxeroxk
 
Trò Chơi Tập Thể
Trò Chơi Tập ThểTrò Chơi Tập Thể
Trò Chơi Tập Thểxeroxk
 
Toefl grammar
Toefl grammarToefl grammar
Toefl grammarxeroxk
 
Thơ Tình Thế Giới
Thơ Tình Thế GiớiThơ Tình Thế Giới
Thơ Tình Thế Giớixeroxk
 
Lab linux phần iv- Internet Services
Lab linux phần iv- Internet ServicesLab linux phần iv- Internet Services
Lab linux phần iv- Internet Servicesxeroxk
 
Lab linux phan iii
Lab linux phan iiiLab linux phan iii
Lab linux phan iiixeroxk
 
Lab linux phan i, ii.doc
Lab linux phan i, ii.docLab linux phan i, ii.doc
Lab linux phan i, ii.docxeroxk
 
huong dan PHP-2
huong dan PHP-2huong dan PHP-2
huong dan PHP-2xeroxk
 
Hướng Dẫn Php
Hướng Dẫn  PhpHướng Dẫn  Php
Hướng Dẫn Phpxeroxk
 
Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010xeroxk
 
Athena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAAthena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAxeroxk
 
Hướng Dẫn Php-3
Hướng Dẫn Php-3Hướng Dẫn Php-3
Hướng Dẫn Php-3xeroxk
 
Athena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng LanAthena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng Lanxeroxk
 
Athena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanAthena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanxeroxk
 
Module 10 configuring windows 7 media applications
Module 10   configuring windows 7 media applicationsModule 10   configuring windows 7 media applications
Module 10 configuring windows 7 media applicationsxeroxk
 

More from xeroxk (20)

Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
 
Hiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên PhotoshopHiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên Photoshop
 
Powerpoint 2010
Powerpoint 2010Powerpoint 2010
Powerpoint 2010
 
Một Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh TếMột Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh Tế
 
Xây Dựng Thương Hiệu
Xây Dựng Thương HiệuXây Dựng Thương Hiệu
Xây Dựng Thương Hiệu
 
Trò Chơi Tập Thể
Trò Chơi Tập ThểTrò Chơi Tập Thể
Trò Chơi Tập Thể
 
Toefl grammar
Toefl grammarToefl grammar
Toefl grammar
 
Thơ Tình Thế Giới
Thơ Tình Thế GiớiThơ Tình Thế Giới
Thơ Tình Thế Giới
 
Xml
XmlXml
Xml
 
Lab linux phần iv- Internet Services
Lab linux phần iv- Internet ServicesLab linux phần iv- Internet Services
Lab linux phần iv- Internet Services
 
Lab linux phan iii
Lab linux phan iiiLab linux phan iii
Lab linux phan iii
 
Lab linux phan i, ii.doc
Lab linux phan i, ii.docLab linux phan i, ii.doc
Lab linux phan i, ii.doc
 
huong dan PHP-2
huong dan PHP-2huong dan PHP-2
huong dan PHP-2
 
Hướng Dẫn Php
Hướng Dẫn  PhpHướng Dẫn  Php
Hướng Dẫn Php
 
Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010
 
Athena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAAthena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNA
 
Hướng Dẫn Php-3
Hướng Dẫn Php-3Hướng Dẫn Php-3
Hướng Dẫn Php-3
 
Athena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng LanAthena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng Lan
 
Athena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanAthena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLan
 
Module 10 configuring windows 7 media applications
Module 10   configuring windows 7 media applicationsModule 10   configuring windows 7 media applications
Module 10 configuring windows 7 media applications
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Module 6 configuring user account security

  • 1. Module 6: Configuring User Account Security
  • 2. Overview Configuring User Account Control Troubleshooting User Account Control
  • 3. Lesson 1: Configuring User Account Control What Is User Account Control? What Do Standard User Privileges Do? Authorize an Application by Using the Compatibility Tab Demonstration: Configuring User Account Control
  • 4. What Is User Account Control? Reduces Exposure and Attack Surface Applications Run With Least Privilege Application Permissions Can Be Elevated
  • 5. What Do Standard User Privileges Do? Remove the Need to Run Tasks as Administrator Grant Additional Privileges to Perform Specific Tasks Provide Additional Services to Perform Tasks Deprecate Power Users Group
  • 6. Authorize an Application by Using the Compatibility Tab Individual User All Users
  • 7. Demonstration: Configuring User Account Control In this demonstration, you will see how to: Respond to a UAC permission request Run an application as an administrator Configure an application to always run as administrator
  • 8. Lesson 2: Troubleshooting User Account Control Administrative Approval Mode User Account Control Panel Demonstration: Troubleshooting User Account Control
  • 9. Administrator Approval Mode Administrators Run as Standard Users Prevents Malicious Software from Running Unnoticed Controlled By Policy
  • 10. User Account Control Panel Change Account Properties Give Domain Users Access Advanced Settings Turn Off UAC
  • 11. Demonstration: Troubleshooting User Account Control In this demonstration, you will see how to: Change an account type Configure UAC policy settings Disable UAC
  • 12. Lab: Configuring User Account Security Exercise 1: Requesting an Application to Run Elevated One Time Exercise 2: Marking an Application to Always Run Elevated Exercise 3: Configuring User Account Control Panel