Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to explore new things in windows vista group policy

2025-04-03 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/01 Report--

This article shows you how to explore new things in the windows vista group strategy, which are concise and easy to understand, and will definitely catch your eyes. I hope you can learn something through the details of this article.

Let's explore what's new in windows vista group policy, as described below.

Sleep Settin

The Sleep Settings folder contains 12 policy items. Each operation contains two types of strategies, one is to control when your computer is powered on, and the other is to control when your computer uses batteries. They are:

Enable the application to prevent sleep switching: if you enable this policy, the application or service can prevent the system from entering mixed sleep, standby, or hibernation mode.

Specify system hibernation timeout: if you enable this policy, you can set how long Windows must be inactive to put the system into hibernation. The values that can be entered here range from 1 to 999999 in seconds.

A password is required when waking up the computer: if you enable this policy or do not configure it, the user will be prompted for a password when you wake up the system, because the system requires a password by default. If you don't want to be prompted for a password, you can disable this policy.

Specifies the system hibernation timeout: like the hibernation timeout policy, the value is also entered in seconds.

Turn off mixed hibernation: if you enable this policy, the system will not put it into hibernation during sleep.

Allow standby during sleep (S1-S3): if you enable this policy, Windows will be able to use standby during computer sleep. If this policy is disabled, the computer will go into hibernation, that is, mixed sleep mode.

In earlier versions of Windows, standby saved work to memory and put the computer in a power-saving state, while hibernation saved work to hard disk. Vista combines standby and hibernation into one state: mixed sleep. In this state, the work is stored on the hard disk, and when the computer is awakened, the previous stage of the work can be restored.

However, you can also enable traditional standby through group policy. The standard ACPI standby state is:

S0: the system is open and ready to work at any time.

S1:CPU power is off; RAM is idle but will be updated. The system can be awakened by mouse, keyboard and so on.

S2 (not implemented very often): all devices are powered off, just like S3, but RAM updates are faster.

S3: all devices are powered off and work is saved to RAM. Whether the keyboard and mouse can wake up your system depends on your control.

S4: all the hardware is turned off and the work is saved to the hard disk. This is equivalent to a dormant state.

Video and display settings:

There are four policies contained in the Video and display Settings folder, which are actually two sets of policy settings when the computer is powered on and the battery is used:

Turn off adaptive display timeout: this setting controls how long the computer is inactive before the display is turned off. Windows automatically adjusts this setting according to the user's settings for the input device.

Turn off the monitor: if you enable this policy, you will need to specify in seconds how long the computer will be inactive before the monitor is turned off.

User account control settings:

One of the most prominent security improvements in Vista is user account Control (UAC). There are nine policies in the Security options folder that you can use to change how this feature works. To change these settings, expand Windows Settings in computer configuration in the left pane of the Group Policy object Editor, locate Security Settings, and then select Local Policy. Click Security options, as shown in figure 6.

Figure 6 you can control how UAC works through group policy

Here are the UAC-related policy configurations you can make in Vista:

Administrator approval mode for built-in Administrator accounts: if you enable this policy, the built-in administrator account will log in in administrative approval mode, which means you will be prompted to agree when privileges are elevated. By default, this policy is disabled, so the built-in administrator account (unlike administrative accounts in other Vista) is logged in XP compatibility mode; all applications can also run with full administrator privileges by default. Enabling this group policy increases security.

Administrator approval mode administrator promotion prompt behavior: by default, all accounts except the built-in administrator account are prompted to agree to the action before they need to elevate privileges. If you enable this policy, you can choose to require the administrator to provide credentials to gain elevated privileges or to reduce security by not prompting credentials or consent actions. This option is shown in figure 7.

Figure 7 you can enhance or weaken security through relevant actions prompted by the administrator

Promotion prompt behavior for standard users: by default, logging in as a standard user account is prompted to enter administrator credentials to elevate privileges. If you enable this policy, you can enhance security by feedback a denied access message when a standard user tries to perform an operation that requires elevated privileges.

Detect application installation and prompt escalation: if you enable this policy, the application installation package that requires elevated permissions will be detected by a heuristic algorithm and will be prompted to elevate permissions when opened.

Only executable files that are signed and verified: this strategy allows you to enhance security by implementing PKI signatures to detect interactive applications that require elevated permissions. By default, PKI certificate chain verification is not implemented.

Promote only UIAccess applications installed in a secure location: if you enable this policy, UIAccess applications cannot be opened unless they are stored in a secure location. Security includes the Program Files directory and the Windows\ System32\ r Murray _\ Program Files (x86) directory. This policy is enabled by default, but you can disable it if you want UIAccess applications stored in other locations to run.

Run all users, including administrators, as standard users: this policy is enabled by default, and it is the heart of Vista's UAC protection. If you disable this policy, all UAC policies will be disabled and security will be greatly reduced. You need to restart for these policy settings to take effect.

Switch to secure Desktop when prompted to promote: this policy is enabled by default; when permission is required, the desktop is locked, and no application can unlock the lock. You can just use this strategy to remove the promotion requirements and make them appear on the normal desktop, but this will reduce security.

There are also some other options.

We have seen only a few of the hundreds of new group policy settings in Vista together. There are also new settings to control Vista's advanced security firewall, configure printers according to location, customize the author of the DVD CD, manage network access protection, configure new Terminal Services / remote Desktop security features, and more. In addition, the new group policy can also serve Internet Explorer 7.

The above is how to explore new things in the windows vista group strategy. Have you learned the knowledge or skills? If you want to learn more skills or enrich your knowledge reserve, you are welcome to follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report