70-410 Articles

75 Articles

Using software restriction policies

Last Updated On : Sunday, August 12, 2018The Software Restriction Policies node is found in the Windows SettingsSecurity Settings node of the User Configuration or the Computer Configuration node of a GPO. By default, the Software Restriction Policies folder is empty. When you create a new policy, two subfolders appear: Security Levels and Additional Rules. […]

Understanding User Account Control (UAC)

Last Updated On : Sunday, August 12, 2018One of the most common Windows security problems arises from the fact that many users perform their everyday computing tasks with more system access than they actually need. Logging on as an Administrator or as a user who is a member of the Administrators group grants the user […]

Configuring local users and groups

Last Updated On : Sunday, August 12, 2018Windows Server 2012 R2 provides two separate interfaces for creating and managing local user accounts: the User Accounts control panel and the Local Users and Groups snap-in for MMC, which is included in the Computer Management console. Both of these interfaces provide access to the same Security Account […]

Using security templates

Last Updated On : Sunday, August 12, 2018A security template is a collection of configuration settings stored as a text file with an .inf extension. Security templates can contain many of the same security parameters as GPOs. However, security templates present these parameters in a unified interface, enable you to save your configurations as files, […]