IT tutorials
 
Windows
 

Managing Users in Windows 8 (part 2) - Family Safety, Group Policies, Blocking CDs, DVDs, Flash Drives, and External Hard Disks

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
1/3/2013 5:46:54 PM

3. Family Safety

Family Safety has many more uses than simply stopping your children from playing games late at night. It can also be used to limit access to certain software packages. You might, for instance, have some work-related software on your home computer that you don’t want other users to access.

To access Family Safety in Windows 8, open the Start screen and type parent. In the search results in the Settings section, click Family Safety.

INSIDE OUT: Using Family Safety in Windows 8

To use Family Safety (see Figure6), you must have at least one Administrator account and one Standard user. It is the latter to which you apply the Family Safety.

The Administrator accounts must be password protected for the feature to work; otherwise, the Standard user will be able to log on using an Administrator account and then switch the Family Safety off.

The Family Safety in Windows 8

Figure 6. The Family Safety in Windows 8

Windows Web Filter

One new feature in Family Safety in Windows 8 is full website filtering (see Figure 7), and it’s a feature that is implemented very well, indeed.

This is a feature that can prevent children from accessing inappropriate or unsuitable websites.

The new Web Filter in Windows 8

Figure 7. The new Web Filter in Windows 8

The new web filter has controls to allow only websites that fall within four categories, Child-friendly, General Interest, Online Communication, and Warn An Adult, and it can also block file downloads.

These categories can be extremely useful in helping to prevent malware from infecting a computer.

4. Group Policies

The Windows Group Policy Editor tool is used almost exclusively in business and corporate IT environments, and thus, it is only available in Windows 8 Pro and Enterprise editions. To access it, open the Start screen, type gpedit.msc, and then in the search results, click Group Policy Editor.

The Group Policy Editor interface is split into two main sections, Computer Configuration and User Configuration, and functions as follows:

  • Computer Configuration covers settings for the entire computer. You will probably not want to change these unless, for example, you are turning off the Windows Firewall or Windows Update in a corporate IT environment.

  • User Configuration covers the settings that apply to specific users. These will normally be specified remotely by a Windows Server configuration, but if you are changing these settings within Windows 8, you must do so on a per-user basis while logged on to that specific user account (see Figure 8).

The Group Policy Editor

Figure 8. The Group Policy Editor

Each of these sections is subdivided further into Software Settings, Windows Settings, and Administrative Templates.

INSIDE OUT: Group Policy Editor availability

The Group Policy Editor is only available in the Pro and Enterprise editions of Windows 8. It is also not available in the ARM version of the operating system.

It is unlikely that you will ever want to change settings in Group Policy Editor unless you are a system administrator on a company network. However, there might be circumstances for which, to enhance security, you want to block user access to the Run command on the Start screen, deny user access to common Windows features such as Windows Media Player, or change the default Windows security level for opening email attachments.

Fortunately, all of the available options in the Group Policy Editor are clearly labeled, and all include detailed descriptions of what happens when you edit them. This can help you to understand how each selection will affect you and other users on your computer so that you can make informed choices.

Local Security Policies

Another tool used almost exclusively in business and corporate IT environments is the Local Security Policy window, which is shown in Figure 9.

This tool is more hidden than it was in Windows 7. To access it, in the full desktop Control Panel, click Administrative Tools, and then click Local Security Policy (see Figure 9).

The Local Security Policy Settings

Figure 9. The Local Security Policy Settings

There is very little that you would want to change in the Local Security Policy window. However, you can access the following two useful features:

  • Windows Firewall with Advanced Security This is where you can set and configure specific rules to allow hardware or software through the Windows 8 firewall. This might include games or access to network storage.

  • Application Control Policies If you have the Enterprise or Ultimate version of Windows 8, you have access to a feature called AppLocker. This tool lets you control what specific software can be installed on your computer, right down to the version number. This can prove useful for features such as graphics card drivers for games and for some plug-ins (for example, Adobe Flash) that will work only with specific software versions. You can use this tool to block the installation of other versions of those applications.

As with the Group Policy Editor, all of the available options in the Local Security Policy Editor are clear and display detailed descriptions when you click their properties. This makes it easy to understand how each option will affect you and other users on the computer and helps you to make informed choices.

Computer Management

More widely used in Windows is the Computer Management console. This is a centralized location for a wide range of useful Windows 8 settings.

The easiest and quickest way to access the Computer Management console is to open the Start screen and press Windows logo key+X, or on the Desktop, bring up the Administration menu and then click Computer Management. You can see the Computer Management console, as shown in Figure 10.

The Computer Management Console

Figure 10. The Computer Management Console

The left panel of the Computer Management Console includes links to all the relevant tools and utilities for managing your computer, but there are some I want to highlight.

  • Task Scheduler You might find that you want Windows 8 to run certain tasks on a set schedule, such as disk cleanup. You can set any task or program to run on a schedule you define by clicking Task Scheduler in the Computer Management console.

  • Event Viewer This is a useful tool for viewing error and other reports from the operating system.

  • Shared Folders You can use Shared Folders to permit and deny access to folders that are shared between users on the same computer or across different computers in a home network.


5. Blocking CDs, DVDs, Flash Drives, and External Hard Disks

One of the biggest security problems—certainly one of the biggest in the corporate space—is the use of external flash drives, CDs, DVDs, and external hard disks. If not carefully vetted, these media can transfer viruses and other malware to a computer or be used to steal information. This is because although computer equipment within an organization can be controlled by using group and security policies, external hardware, especially personal flash drives, is not subject to the same rules and could also be used on a third-party or home computer with little or no virus and malware protection. You can use Group Policy Editor to deny access to these devices for specific users or for everyone.

To access the Removable Storage Access settings in the Group Policy Editor (see Figure 11), click Computer Configuration, click User Configuration, and then click Administrative Templates and System.

Managing removable storage in the Group Policy Editor

Figure 11. Managing removable storage in the Group Policy Editor

Note

USB flash drives and external hard disks are classified as removable disks. To allow or deny access to a wide range of plug-in drives, right-click any of the settings, click Edit, and then click Disable to block access to the selected group of drives.

Summary

It can be argued that no user should ever be allowed to use a computer because then nothing can go wrong with it. In practice, however, it is in how individual and groups of users are managed on the computer that can make the difference between a stable and reliable system and one riddled with problems and malware.

As always though, the key to avoiding problems with users is in training and awareness. For users who will just use the Start screen and new Apps, problems can be minimized further. With Windows 8, however, this is an inevitable learning curve, and effective training is needed in conjunction with user and group management to preclude problems.

 
Others
 
- Managing Users in Windows 8 (part 1) - Managing User Accounts
- Windows Small Business Server 2011 : Using File Server Resource Manager (part 3) - Screening Files
- Windows Small Business Server 2011 : Using File Server Resource Manager (part 2) - Creating Quotas and Auto Quotas, Viewing and Managing Quotas, Creating and Editing Quota Templates
- Windows Small Business Server 2011 : Using File Server Resource Manager (part 1) - Scheduling Storage Reports, Using Directory Quotas
- Performing Maintenance on Windows 8 (part 2) - Maintaining Windows 8
- Performing Maintenance on Windows 8 (part 1) - Windows 8 Automatic Maintenance, Defragmenting Your Hard Disks
- Windows 7 : Running Programs and Gadgets - Running Older Programs
- Windows 7 : Running Programs and Gadgets - Running Commands
- Windows 8 : Optimizing Backup and Restore (part 4) - File History and Version Control
- Windows 8 : Optimizing Backup and Restore (part 3) - Backing Up the Operating System
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us