19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

95 along with a user and a computer via the system guidelines, otherwise the<br />

same restrictions will apply as for a standard user. <strong>The</strong> password may only be<br />

made known to the administrator and his substitute.<br />

In any case, this guideline must be saved in the CONFIG.POL file.<br />

4. Defining guidelines for single users based on a standard user and a<br />

standard computer<br />

If users are required whose restrictions should differ from those specified<br />

under 1., the guidelines are the same as for 1. but must additionally be set up<br />

in the CONFIG.POL file. <strong>The</strong> standard profile is copied, the name of the user<br />

concerned will then be given to the profile and the restrictions are set as<br />

described under 1.<br />

5. Activating the guidelines<br />

When the administrator sets up the system guidelines, particular care and<br />

attention must be given as inconsistent system conditions can easily be set<br />

which hinder work with the computer. <strong>The</strong> operating system would have to be<br />

re-installed. <strong>The</strong>refore the system guidelines should only be activated once<br />

they have been defined with utmost care.<br />

For this purpose, the administrator must open the local registry with the<br />

system guideline editor (POLED<strong>IT</strong>.EXE) and the switch REMOTE-UPDATE<br />

for the LOCAL COMPUTER under the option NETWORK-UPDATE must be<br />

switched on. INTERACTIVE must be selected as update-mode. <strong>The</strong> path for<br />

the CONFIG.POL as described above must also be defined.<br />

Highly experienced administrators can carry out the necessary settings with<br />

the registry editor (program REGED<strong>IT</strong>.EXE).<br />

Furthermore, the user profiles must be activated under the option<br />

PASSWORDS in the program group CONTROL PANEL.<br />

Additional controls:<br />

- From operational point of view, is restriction of the user environment<br />

necessary?<br />

- Is it necessary to restrict certain resources?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!