How to use UAC to improve the security of Windows 7 [map]

  
                

Q: How to use UAC to improve the security of Windows 7?

A: In the Windows7 operating system, a new computer security management mechanism, UAC (User Account Control), is proposed. What is the use of this feature? Simply put, other users have made changes to the operating system, and these changes require administrator privileges. At this point, the operating system will automatically notify the administrator to let it know whether to allow this. change. Although in previous versions, there were limitations in this regard. But there has been a big improvement in Windows 7. It not only subdivides the level of control, but also automatically notifies the administrator.

First, administrators can choose different control levels according to their needs

In Windows 7, this control level is divided into four levels. The highest level is “Always notify me", that is, users install application software or upgrade the application software, the application software changes the operating system without knowing or knowing the user, modify the Windows settings, etc. The administrator reports.

The second level is "Only when the application tries to change the computer" to notify the system administrator. This level is the default control level for the operating system. The main difference between him and the first level is that the system administrator is not notified when changing the Windows settings. At this level, even if there are malicious programs running on the operating system, it will not cause much negative impact on the operating system. Because its malicious program can not modify the system configuration without the knowledge of the system administrator, such as changing the registry, changing the default page of Internet Explorer, changing the service startup list, and so on. For this reason, for most users, especially for enterprise users, this level of security is sufficient. If the level is too high, it will be too rigid. Maybe the system administrator has to keep on running for it.

The security levels of the third and fourth levels are gradually reduced, and finally all are not notified. In fact, this control level is similar to the control level of the original IE browser, and is a custom control level of Microsoft. As a system administrator, you need to understand the specific content of each level of control, and then set the security level according to the actual situation of the enterprise. In general, the higher the security level, the more secure the operating system. But system administrators may need to take more time to respond to user complaints. Because the user may have any changes to the operating system, they need to inform the system administrator. Fish and bear's paws can't be combined, and system administrators need to strike a balance between safety and convenience.

Second, the user rights are not enough to inform the system administrator

Do not know if readers have used Microsoft or other company's workflow products? In fact, Microsoft is drawing on this issue. Workflow processing methods. When a user attempts to change a setting or secure an application, the system sends a request to the manager when its permissions are insufficient. The system administrator will see a dialog box the next time they log in to the system. The settings that the user needs to change or the applications to install are displayed in the dialog box. System administrators should review this information carefully to determine if it will compromise the stability of the system. You can then tell the operating system through this dialog box to allow or deny the user's changes. Finally, the system will feedback this decision from the system administrator to the user. The user can continue the subsequent operations. If the system administrator agrees, you can install the application or change the configuration of the operating system. Obviously, this process is very familiar to everyone. Yes, this is a workflow process. In the Windows 7 operating system, this workflow can be seen in many places. This is also the embodiment of the humanization of the Windows7 operating system.

Previous 12 Next Total 2 Pages

Copyright © Windows knowledge All Rights Reserved