programming4us
programming4us
DESKTOP

Settings Breakdown for Windows Server 2008 and Windows Vista : Policies (part 3) - Security Settings - Restricted Groups, System Services, Registry

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
2.3.3 Restricted Groups (Computer Configuration Only)

This setting allows you to centralize the group membership of both groups that reside in Active Directory and those that live locally in the Security Accounts Manager (SAM) on each computer, referred to as local groups. The setting allows you to control group membership, which includes both user accounts and group accounts. You can also control the groups in which a specified group has membership. Both options are shown in Figure 4.

Figure 4. The Restricted Groups policy allows you to control group membership.


Warning

Restricted Groups is a delete-and-replace policy. This means that if you define a list of user and group accounts to have membership in a specified group, the existing group members will first be deleted and replaced with the user and group accounts that you define in the policy.


Note

If you want to control the membership of local groups without having the delete-and-replace behavior of Restricted Groups, consider using Group Policy Local Users and Groups.


2.3.4 System Services (Computer Configuration Only)

This policy allows you to control certain aspects of services that reside on the target computer. The settings available in this policy include the ability to control the following aspects of services (also shown in Figure 5):

  • Start-up mode

  • Security permissions to control service

Figure 5. The System Services policy allows you to control the start-up mode and permissions of the service.


Note

To control more details of services that are running on target computers, you can use Group Policy Services.


2.3.5 Registry (Computer Configuration Only)

This policy is designed to control permissions on registry keys. You can control the full array of NTFS permissions, including advanced permissions, auditing, and ownership of the objects configured in the policy. After the policy is configured, you have the option of controlling whether the permissions will propagate down through the subkeys in the registry or only apply to the registry key defined, as shown in Figure 6.

Figure 6. The Registry policy allows you to control security permissions and other NTFS aspects of registry keys.


Warning

Application of permissions to registry keys can be resource intensive and cause delayed computer start-up. You should use this policy only when absolutely necessary and only after testing to ensure that the performance of the start-up is satisfactory for your production environment.

Other  
  •  Windows 8 : Managing Application Virtualization and Run Levels (part 2) - Setting Run Levels, Optimizing Virtualization and Installation Prompting for Elevation
  •  Windows 8 : Managing Application Virtualization and Run Levels (part 1) - Application Access Tokens and Location Virtualization, Application Integrity and Run Levels
  •  Windows 8 : Installing and Maintaining Applications - Managing Desktop Apps
  •  Windows Server 2003 : Managing Software Deployment with Group Policy (part 2) - Software Deployment Approaches, Distributing Windows Installer Packages
  •  Windows Server 2003 : Managing Software Deployment with Group Policy (part 1) - Software Installation Extension
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 3) - Folder Redirection Best Practices
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 2) - Policy Removal Considerations, Folder Redirection and Offline Files
  •  Windows Server 2003 : Managing Special Folders with Group Policy (part 1) - Folder Redirection, Setting Up Folder Redirection
  •  Windows 7 : Computer Management (part 2) - Shared Folders,Services
  •  Windows 7 : Computer Management (part 1) - Task Scheduler, Event Viewer
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us