Adaptec 2940U - AHA Storage Controller Ultra SCSI 20 MBps Información técnica Pagina 107

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 186
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 106
93
CHAPTER 4
The third phase of putting a MetaFrame solution into production is to secure your
data, applications, and systems from unauthorized use and attack. This chapter
provides the following sections to assist you:
K
Defining User Rights
K
Protecting Against Viruses and Trojan Horses
K
Auditing System Activity
K
Securing Data and Applications
Defining User Rights
In MetaFrame and Windows 2000, there are several ways to define and enhance
users’ workstation environments. You can define network connections, available
applications, Windows program groups, and Windows desktop appearance. If you
want, you can prevent users from changing the desktop environment you create.
If you need to set up a large number of users who have similar characteristics on a
MetaFrame server, it is convenient to create a user template. This template can be
configured with the desktop configuration, applications, and network drives that
the user needs and can then be used as a pattern to create new users when needed.
User Profiles
The most powerful method you have of managing user environments is through
user profiles. A profile is a file that serves as a snapshot of a user’s desktop
environment. With profiles, you can also restrict users’ ability to change these
settings. You can create profiles for users who have domain accounts and store
these profiles on servers. Each user can have a single profile with one
configuration that is loaded when the user logs on.
Securin
g
the Enterprise
Vista de pagina 106
1 2 ... 102 103 104 105 106 107 108 109 110 111 112 ... 185 186

Comentarios a estos manuales

Sin comentarios