Posts Tagged ‘access rights’

Manage USB Access Rights with USB Disk Manager

Friday, June 22nd, 2012

Here’s an interesting program that seems to address the threat of viruses and malware that propagate via USB drives …

When you connect a removable USB drive to a Windows PC, you will notice that it works in many regards like any other hard drive or storage device on the PC from that moment on. You can copy files on the device or execute programs on it that you want to run on the system. The behavior makes sense in many environments, especially for home users.

(more…)

2 Ways to Block Windows 8 Users from Uninstalling Apps in Metro

Tuesday, April 24th, 2012

Here are a couple of helpful tricks for admins who will soon need to manage user access on Windows 8 machines …

With apps making the core of the Metro user interface in Windows 8, come new challenges for system administrators, organizations and businesses to control what users are allowed to do, and what they should not do when it comes to these new features.

(more…)

What does Your Console Server do to Ensure Internal Network Security?

Tuesday, October 5th, 2010

In many data center applications, a single console server might be shared by many different personnel and departments. For example, your lower level IT support staff might need access to command functions on routers and switches, while your engineers might need access to command functions on a file server. One challenge that constantly arises in multi-user environments of this type, is the task of allowing users to access certain devices, while preventing them from accessing other devices that might belong to a different department. Likewise, you might want to allow some users to invoke status display commands, while preventing them from changing console server configuration.

(more…)

Different Access Rights for Different Types of Console Server Users …

Friday, August 6th, 2010

In most network management applications, a console server may have many different users. In addition to allowing access by IT Administrators, it’s not uncommon for console servers to provide access to other users who may be responsible for a specific network device or collection of devices; in some cases, an individual department might have its own, lower-level IT techs, who also need access to console server functions too. This multiplicity of users presents an interesting challenge for the IT Administrator: how do you provide different levels of access for different level users, while still assuring that critical configuration functions remain secure?

(more…)