Course Hero Logo

Changing uac settings if the uac is too restrictive

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 82 - 84 out of 834 pages.

Changing UAC SettingsIf the UAC is too restrictive for you or for your users, the settings can be changed. Open theMicrosoft Management Console (MMC) and open theLocal Security Policysettings. You must belogged on to the administrator account to modify:Whether the UAC is enabled or disabled.What the UAC behavior is for administrator or Standard Users.Application-specific behavior.Tasks Requiring a UAC PromptTasks that are preceded by theSecurity Shieldicon will invoke the UAC.Group AccountsWindows includes several built-in group accounts that you can use to control basic system security.Local Windows groups are stored in the registry.Group AccountUsers in this group can:AdministratorsPerform all administrative tasks on the computer.When an account is created during the installation of Windows, it isautomatically added to this group by default.UsersRun applications and perform other day-to-day computer tasks for which thegroup has been granted permissions.GuestsPerform any tasks for which the group has permissions. By default, all thatmembers of this group can do is access the system.Event LogReadersRead event logs.RemoteDesktop UsersLog on to the system remotely from another system.70|CompTIA®A+®: A Comprehensive Approach (Exams 220-901 and 220-902)Lesson 2: Operating System Fundamentals|Topic BReassure participantsthat the MMC will beexplained in greaterdetail later in the course.Group Accounts
Other default groups are also created, and can perform the action indicated by the group name,including:Backup Operators who can back up and restore files on the computer.Cryptographic Operators who can perform cryptographic operations.Distributed COM Users who can start, activate, and use DCOM objects on the computer.IIS_IUSRS used by the Internet Information Services (IIS).Network Configuration Operators who can make TCP/IP setting changes as well as release andrenew TCP/IP addresses.Performance Log Users who can manage performance counters, logs, and alerts on the computerwithout being a member of the Administrators group.Performance Monitor Users who can monitor performance counters on the computer withoutbeing a member of the Performance Log Users group.Offer Remote Assistance Helpers who can offer Remote Assistance to users of the computer.System Files and FoldersSystem filesare the files that are required for the operating system to function to its fullest capabilities.These files are typically hidden because their deletion can prevent the computer from workingproperly. For system files, both the file extension and the location of the file in the system hierarchyare important, as they help the computer recognize it as a system file.In the file system hierarchy, the termsfolderanddirectoryare used interchangeably to describe acontainer that is used to organize files and other folders. System software and applications usuallycreate standardized directory structures at the time of installation. Users can also create their owndirectory structures.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 834 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture