SlideShare a Scribd company logo
1 of 12
Module 6: Configuring
User Account Security
Overview
Configuring User Account Control
Troubleshooting User Account Control
Lesson 1: Configuring User Account Control
What Is User Account Control?
What Do Standard User Privileges Do?
Authorize an Application by Using the Compatibility Tab
Demonstration: Configuring User Account Control
What Is User Account Control?
Reduces Exposure and Attack Surface
Applications Run With Least Privilege
Application Permissions Can Be Elevated
What Do Standard User Privileges Do?
Remove the Need to Run Tasks as Administrator
Grant Additional Privileges to Perform Specific Tasks
Provide Additional Services to Perform Tasks
Deprecate Power Users Group
Authorize an Application by Using the
Compatibility Tab
Individual User
All Users
Demonstration: Configuring User Account Control
In this demonstration, you will see how to:
Respond to a UAC permission request
Run an application as an administrator
Configure an application to always run
as administrator
Lesson 2: Troubleshooting User Account Control
Administrative Approval Mode
User Account Control Panel
Demonstration: Troubleshooting User Account Control
Administrator Approval Mode
Administrators Run as Standard Users
Prevents Malicious Software from Running Unnoticed
Controlled By Policy
User Account Control Panel
Change Account Properties
Give Domain Users Access
Advanced Settings
Turn Off UAC
Demonstration: Troubleshooting User Account
Control
In this demonstration, you will see how to:
Change an account type
Configure UAC policy settings
Disable UAC
Lab: Configuring User Account Security
Exercise 1: Requesting an Application to
Run Elevated One Time
Exercise 2: Marking an Application to
Always Run Elevated
Exercise 3: Configuring User Account
Control Panel

More Related Content

Similar to Module 6 configuring user account security

Advanced Permissions: Magento Extension by Amasty. User Guide.
Advanced Permissions: Magento Extension by Amasty. User Guide.Advanced Permissions: Magento Extension by Amasty. User Guide.
Advanced Permissions: Magento Extension by Amasty. User Guide.Amasty
 
“Elemental elements”
“Elemental elements”“Elemental elements”
“Elemental elements”rolly fahdial
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!Cireson
 
How to Write Test Cases in Software Testing? A Step-by-Step QA Guide
How to Write Test Cases in Software Testing? A Step-by-Step QA GuideHow to Write Test Cases in Software Testing? A Step-by-Step QA Guide
How to Write Test Cases in Software Testing? A Step-by-Step QA GuideMinuscule Technologies
 
Online examination system
Online examination systemOnline examination system
Online examination systemNarendra Sonone
 
Viewfinity Product Overview
Viewfinity Product OverviewViewfinity Product Overview
Viewfinity Product Overviewakeophila
 
Beyond Roles: A Practical Approach to Enterprise User Provisioning
Beyond Roles: A Practical Approach to Enterprise User ProvisioningBeyond Roles: A Practical Approach to Enterprise User Provisioning
Beyond Roles: A Practical Approach to Enterprise User ProvisioningHitachi ID Systems, Inc.
 
Software Testing presentation
Software Testing presentationSoftware Testing presentation
Software Testing presentationRazia Sultana
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmtodanyboy
 
Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...ScriptLogic
 
UAT User Acceptance Technology
UAT User Acceptance TechnologyUAT User Acceptance Technology
UAT User Acceptance TechnologyEeshAftab
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management SystemDipankar Boruah
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1waqar younas
 
Vb net xp_14
Vb net xp_14Vb net xp_14
Vb net xp_14Niit Care
 
B4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteriaB4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteriab4usolution .
 
software testing methodologies
software testing methodologiessoftware testing methodologies
software testing methodologiesJhonny Jhon
 
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptxFITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptxsikhaverma3
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Sangeetha Rangarajan
 

Similar to Module 6 configuring user account security (20)

Advanced Permissions: Magento Extension by Amasty. User Guide.
Advanced Permissions: Magento Extension by Amasty. User Guide.Advanced Permissions: Magento Extension by Amasty. User Guide.
Advanced Permissions: Magento Extension by Amasty. User Guide.
 
“Elemental elements”
“Elemental elements”“Elemental elements”
“Elemental elements”
 
The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!The Remote Manage App for Configuration Manager Webinar!
The Remote Manage App for Configuration Manager Webinar!
 
How to Write Test Cases in Software Testing? A Step-by-Step QA Guide
How to Write Test Cases in Software Testing? A Step-by-Step QA GuideHow to Write Test Cases in Software Testing? A Step-by-Step QA Guide
How to Write Test Cases in Software Testing? A Step-by-Step QA Guide
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Viewfinity Product Overview
Viewfinity Product OverviewViewfinity Product Overview
Viewfinity Product Overview
 
Beyond Roles: A Practical Approach to Enterprise User Provisioning
Beyond Roles: A Practical Approach to Enterprise User ProvisioningBeyond Roles: A Practical Approach to Enterprise User Provisioning
Beyond Roles: A Practical Approach to Enterprise User Provisioning
 
Software Testing presentation
Software Testing presentationSoftware Testing presentation
Software Testing presentation
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmt
 
Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...Administrator Privileges: Finding Balance between desktop security & user pro...
Administrator Privileges: Finding Balance between desktop security & user pro...
 
UAT User Acceptance Technology
UAT User Acceptance TechnologyUAT User Acceptance Technology
UAT User Acceptance Technology
 
Group 9 SRS
Group 9 SRSGroup 9 SRS
Group 9 SRS
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1
 
Vb net xp_14
Vb net xp_14Vb net xp_14
Vb net xp_14
 
B4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteriaB4 u solution_writing test cases from user stories and acceptance criteria
B4 u solution_writing test cases from user stories and acceptance criteria
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
software testing methodologies
software testing methodologiessoftware testing methodologies
software testing methodologies
 
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptxFITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
FITNESS-GYM-MANAGEMENT-SYSTEM-Project-Presentation.pptx
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 

More from xeroxk

Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...xeroxk
 
Hiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên PhotoshopHiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên Photoshopxeroxk
 
Powerpoint 2010
Powerpoint 2010Powerpoint 2010
Powerpoint 2010xeroxk
 
Một Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh TếMột Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh Tếxeroxk
 
Xây Dựng Thương Hiệu
Xây Dựng Thương HiệuXây Dựng Thương Hiệu
Xây Dựng Thương Hiệuxeroxk
 
Trò Chơi Tập Thể
Trò Chơi Tập ThểTrò Chơi Tập Thể
Trò Chơi Tập Thểxeroxk
 
Toefl grammar
Toefl grammarToefl grammar
Toefl grammarxeroxk
 
Thơ Tình Thế Giới
Thơ Tình Thế GiớiThơ Tình Thế Giới
Thơ Tình Thế Giớixeroxk
 
Lab linux phần iv- Internet Services
Lab linux phần iv- Internet ServicesLab linux phần iv- Internet Services
Lab linux phần iv- Internet Servicesxeroxk
 
Lab linux phan iii
Lab linux phan iiiLab linux phan iii
Lab linux phan iiixeroxk
 
Lab linux phan i, ii.doc
Lab linux phan i, ii.docLab linux phan i, ii.doc
Lab linux phan i, ii.docxeroxk
 
huong dan PHP-2
huong dan PHP-2huong dan PHP-2
huong dan PHP-2xeroxk
 
Hướng Dẫn Php
Hướng Dẫn  PhpHướng Dẫn  Php
Hướng Dẫn Phpxeroxk
 
Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010xeroxk
 
Athena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAAthena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAxeroxk
 
Hướng Dẫn Php-3
Hướng Dẫn Php-3Hướng Dẫn Php-3
Hướng Dẫn Php-3xeroxk
 
Athena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng LanAthena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng Lanxeroxk
 
Athena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanAthena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanxeroxk
 
Module 10 configuring windows 7 media applications
Module 10   configuring windows 7 media applicationsModule 10   configuring windows 7 media applications
Module 10 configuring windows 7 media applicationsxeroxk
 

More from xeroxk (20)

Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
Báo cáo NetCitizens Việt Nam- Tình hình sử dụng và tốc độ phát triển...
 
Hiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên PhotoshopHiệu ứng Nước trên Photoshop
Hiệu ứng Nước trên Photoshop
 
Powerpoint 2010
Powerpoint 2010Powerpoint 2010
Powerpoint 2010
 
Một Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh TếMột Số Thuật Ngữ Kinh Tế
Một Số Thuật Ngữ Kinh Tế
 
Xây Dựng Thương Hiệu
Xây Dựng Thương HiệuXây Dựng Thương Hiệu
Xây Dựng Thương Hiệu
 
Trò Chơi Tập Thể
Trò Chơi Tập ThểTrò Chơi Tập Thể
Trò Chơi Tập Thể
 
Toefl grammar
Toefl grammarToefl grammar
Toefl grammar
 
Thơ Tình Thế Giới
Thơ Tình Thế GiớiThơ Tình Thế Giới
Thơ Tình Thế Giới
 
Xml
XmlXml
Xml
 
Lab linux phần iv- Internet Services
Lab linux phần iv- Internet ServicesLab linux phần iv- Internet Services
Lab linux phần iv- Internet Services
 
Lab linux phan iii
Lab linux phan iiiLab linux phan iii
Lab linux phan iii
 
Lab linux phan i, ii.doc
Lab linux phan i, ii.docLab linux phan i, ii.doc
Lab linux phan i, ii.doc
 
huong dan PHP-2
huong dan PHP-2huong dan PHP-2
huong dan PHP-2
 
Hướng Dẫn Php
Hướng Dẫn  PhpHướng Dẫn  Php
Hướng Dẫn Php
 
Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010Hướng Dẫn Sử Dụng excel 2010
Hướng Dẫn Sử Dụng excel 2010
 
Athena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNAAthena lab Hướng Dẫn Học CCNA
Athena lab Hướng Dẫn Học CCNA
 
Hướng Dẫn Php-3
Hướng Dẫn Php-3Hướng Dẫn Php-3
Hướng Dẫn Php-3
 
Athena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng LanAthena Bài Giảng Mạng Lan
Athena Bài Giảng Mạng Lan
 
Athena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLanAthena Bài Giảng Mạng WLan
Athena Bài Giảng Mạng WLan
 
Module 10 configuring windows 7 media applications
Module 10   configuring windows 7 media applicationsModule 10   configuring windows 7 media applications
Module 10 configuring windows 7 media applications
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 

Recently uploaded (20)

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

Module 6 configuring user account security

  • 1. Module 6: Configuring User Account Security
  • 2. Overview Configuring User Account Control Troubleshooting User Account Control
  • 3. Lesson 1: Configuring User Account Control What Is User Account Control? What Do Standard User Privileges Do? Authorize an Application by Using the Compatibility Tab Demonstration: Configuring User Account Control
  • 4. What Is User Account Control? Reduces Exposure and Attack Surface Applications Run With Least Privilege Application Permissions Can Be Elevated
  • 5. What Do Standard User Privileges Do? Remove the Need to Run Tasks as Administrator Grant Additional Privileges to Perform Specific Tasks Provide Additional Services to Perform Tasks Deprecate Power Users Group
  • 6. Authorize an Application by Using the Compatibility Tab Individual User All Users
  • 7. Demonstration: Configuring User Account Control In this demonstration, you will see how to: Respond to a UAC permission request Run an application as an administrator Configure an application to always run as administrator
  • 8. Lesson 2: Troubleshooting User Account Control Administrative Approval Mode User Account Control Panel Demonstration: Troubleshooting User Account Control
  • 9. Administrator Approval Mode Administrators Run as Standard Users Prevents Malicious Software from Running Unnoticed Controlled By Policy
  • 10. User Account Control Panel Change Account Properties Give Domain Users Access Advanced Settings Turn Off UAC
  • 11. Demonstration: Troubleshooting User Account Control In this demonstration, you will see how to: Change an account type Configure UAC policy settings Disable UAC
  • 12. Lab: Configuring User Account Security Exercise 1: Requesting an Application to Run Elevated One Time Exercise 2: Marking an Application to Always Run Elevated Exercise 3: Configuring User Account Control Panel