You are a system administrator for a company network running all Windows 7 workstations, and you rely on User Account Control to minimize the possibility of system infiltration by unauthorized software. Many of the department employees spend most of their time performing administrative tasks for the network and therefore require administrative access to their systems. The IS department for the company headquarters also uses an “open office” design, meaning that employees are constantly wandering around to each others’ work areas, often leaving their workstations logged on.
You are concerned about the danger of unattended workstations being used to gain administrative access to the systems. What changes can you make to the UAC configuration to minimize this possibility? Explain how these changes would enhance the security of the systems.
Recently Asked Questions
- Please refer to the attachment to answer this question. This question was created from STAT_200_Common_Final_Fall_2018_OL4.pdf.
- this is a question about antenna and I need your help please regards
- Consider the data below showing Hyatt Hotels media spending for Q1 2017. Carefully describe Hyatt's media spending based on calculations of share and