Chapter 6: Configuring Windows Vista Security

As a Consumer Support Technician, there’s a good chance that you’re aware of potential security issues that occur on customers’ computers. It’s not uncommon to hear complaints related to system slowdowns after visiting an unfamiliar Web site or installing a new application. Cleaning computers that have been infected by viruses or spyware can be a difficult and time-consuming process. The ideal solution is to prevent them from being infected in the first place. That leads to increasing security. Often, it’s necessary to reduce the permissions that are granted to users on their own computers.

Security and usability are often at odds: increasing one often decreases the other. This makes the true goal of configuring and managing security settings a balancing act. Imagine, for example, if you were required to enter five different pieces of personal information to log on to a computer. In many ways, this system might be more secure than one that just required a single password. However, it would make the act of using your computer cumbersome and frustrating. You might even resort to writing down the necessary information on a piece of paper that you store near the computer (thereby negating the real benefits of the security itself). The net result would be that the drawbacks of implementing security overshadowed its potential benefits. On the other hand, you cannot simply grant all users full permissions to make changes to all areas of their systems. This often leads to the installation of malicious software or accidental file deletions and operating system changes.

Users rely on your expertise as a Consumer Support Technician to help them ensure that their systems remain secure. They expect to be reasonably protected from malware such as viruses, unwanted third-party applications, and security issues. Customers also expect you to help keep their systems usable and performing well over time.

One of the fundamental design goals Microsoft mandated for Windows Vista was to make the product as secure as possible while retaining compatibility with the vast library of existing programs that have been written for the Windows platform. Numerous features have been designed to meet this goal. In this chapter, you’ll learn ways in which you can create, configure, and manage standard and administrator user accounts. Then, you’ll learn about the User Account Control (UAC) feature of Windows Vista, including many different options that can be configured to meet users’ needs. These are critical aspects of working with a secure operating system, whether in a home or small business environment.

Exam objectives in this chapter:

  • Customize and configure user accounts.
  • Configure User Account Control.

Lessons in this chapter:

  • Lesson 1: Managing User Accounts
  • Lesson 2: Understanding User Account Control (UAC)

     Next >

 

 

© Microsoft. All Rights Reserved.