Q: How to use UAC to improve the security of Windows 7?
A: In the Windows7 operating system, a new computer security management mechanism, UAC (User Account Control), is proposed. What is the use of this feature? Simply put, other users have made changes to the operating system, and these changes require administrator privileges. At this point, the operating system will automatically notify the administrator to let it know whether to allow this. change. Although in previous versions, there were limitations in this regard. But there has been a big improvement in Windows 7. It not only subdivides the level of control, but also automatically notifies the administrator.
First, administrators can choose different control levels according to their needs
In Windows 7, this control level is divided into four levels. The highest level is “Always notify me", that is, users install application software or upgrade the application software, the application software changes the operating system without knowing or knowing the user, modify the Windows settings, etc. The administrator reports.
The second level is "Only when the application tries to change the computer" to notify the system administrator. This level is the default control level for the operating system. The main difference between him and the first level is that the system administrator is not notified when changing the Windows settings. At this level, even if there are malicious programs running on the operating system, it will not cause much negative impact on the operating system. Because its malicious program can not modify the system configuration without the knowledge of the system administrator, such as changing the registry, changing the default page of Internet Explorer, changing the service startup list, and so on. For this reason, for most users, especially for enterprise users, this level of security is sufficient. If the level is too high, it will be too rigid. Maybe the system administrator has to keep on running for it.
The security levels of the third and fourth levels are gradually reduced, and finally all are not notified. In fact, this control level is similar to the control level of the original IE browser, and is a custom control level of Microsoft. As a system administrator, you need to understand the specific content of each level of control, and then set the security level according to the actual situation of the enterprise. In general, the higher the security level, the more secure the operating system. But system administrators may need to take more time to respond to user complaints. Because the user may have any changes to the operating system, they need to inform the system administrator. Fish and bear's paws can't be combined, and system administrators need to strike a balance between safety and convenience.
Second, the user rights are not enough to inform the system administrator
Do not know if readers have used Microsoft or other company's workflow products? In fact, Microsoft is drawing on this issue. Workflow processing methods. When a user attempts to change a setting or secure an application, the system sends a request to the manager when its permissions are insufficient. The system administrator will see a dialog box the next time they log in to the system. The settings that the user needs to change or the applications to install are displayed in the dialog box. System administrators should review this information carefully to determine if it will compromise the stability of the system. You can then tell the operating system through this dialog box to allow or deny the user's changes. Finally, the system will feedback this decision from the system administrator to the user. The user can continue the subsequent operations. If the system administrator agrees, you can install the application or change the configuration of the operating system. Obviously, this process is very familiar to everyone. Yes, this is a workflow process. In the Windows 7 operating system, this workflow can be seen in many places. This is also the embodiment of the humanization of the Windows7 operating system.
Customizing desktop themes can make the desktop more personal, and its not difficult to implement th
Recently I learned a Win7 trick on Microsoft China Win7 microblogging — — through the se
There are three types of VHD files that can be created using Hy
1. The real machine is Win7 Enterprise Edition, and the virtual machine is also the enterprise versi
Setting up Win7 system shared folder can modify the method of adding or deleting files
A simple move makes Windows7 no longer black screen
Uninstalling is no longer just one way to teach you how to uninstall easily
What should I do if the win7 wireless mouse pauses?
Windows 7 how to synchronize the view of the folder in one step
Windows7 system notebook taskbar (when there are too many tags) how to not merge similar tags
Window7 system to close the windows media center function method
Winshell command for Win7 system
Win7 LAN shared printer settings
Win7 desktop theme landscaping tutorial
Win10 switch account error code 0x80070057 two solutions
Win10 Mobile Preview 10536 Partial Repair Summary
Win10 boot sound is gone? Win10 boot sound setting method
Win10 Build 10130 is open to Slow Ring users
How to make Win10 avatar Win10 avatar production URL is how much
Ingeniously solve the problem of the number key failure on the right side of the computer keyboard.
Win7 installation shows error 0XC004F061 solution
How to set access permissions for Win2003 application