Abstract

This chapter offers a few best-practice guidelines for use with networks containing PCs and workstations. Workstations and PC operating systems have a fraction of the features of server operating systems. Typically, PCs are used by a single person and are shut off at the end of the day. These systems often have a network connection, internet access, e-mail, and can hold personal and corporate data. The three best practices are also discussed. For operating systems with no Iogon authentication, access to the PC should be limited by using the power-on password option at boot-up. Users should be authenticated by a username and password for access to a computer network. Access to shared drives on a desktop PC should be password protected.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call