Tuesday, 25 December 2012

user rights


Another important aspect of computer security is access control. Usually, the right of access to a given resource tends to shut rather than individual users. Therefore, enter a list of all the groups in your security guide. List must contain a description of the group and what permissions are required so that the user can be a member of the group.

make the list is not an lightly and should be maintained continuously. You will benefit with the document. First, by having the data group permissions in writing. You can see that everything is consistent. This is a surefire way to ensure that no one is to change the group permissions. Should do checks at specified intervals.

Another advantage could be a weapon in the face of a stubborn manager. Suppose the marketing manager asked that people put in all groups. At the time answered not, he can just say that you have no basis for rejecting his request.

One way to overcome these managers face is to take your security. and shows a black and white counts where there the phrase "to be a member of the Administrators group, the user must ...".


read more reviews later on label create network documentation


No comments:

Post a Comment

flag counter

Flag Counter