Categories Networking

The Power with Power Users


The power users group is often used without knowledge of how much actual power it gives a user. With Power User privileges a person can modify certain computer-wide settings, create user accounts, install device drivers (signed or unsigned), and install uncertified programs.

These privileges are more than enough for a member of this group to be able to install a malicious file onto the system so that an administrator of the machine could execute it and completely compromise the system.

This being the case, unless you have a specific reason for a group of users to be members of the power users group then they should probably be in the users group. If you must have them in the power users group then a good idea is to use group policy to further enhance the security of those machines being accessed.

***


Chris Sanders is the network administrator for one of the largest public school systems in the state of Kentucky. Chris's specialties include general network administration, windows server 2003, wireless networking, and security. You can view Chris' personal website at www.chrissanders.org.

Chris Sanders

Share
Published by
Chris Sanders

Recent Posts

What’s next in the evolution of biometrics and facial recognition technology?

Facial recognition technology has matured to the point of being reliable — for better or for worse. What does the…

2 hours ago

Locking down your Exchange server with cipher suites

Cipher suites are a set of algorithms you need to secure your environment, either by using SSL and TLS. Here’s…

5 hours ago

AI cyber risks: What to look out for when deploying AI technology

Artificial intelligence has greatly improved modern life. But businesses must recognize that AI cyber risks exist and take appropriate measures.

21 hours ago

Review: Office 365 synchronizing and administration tool CiraSync

CiraSync offers an enterprise solution for syncing global address list contacts and calendars to smartphones and other mobile devices. Here’s…

1 day ago

HIPAA IT compliance: Privacy and security rules you must know

HIPAA is the mandatory health regulation that must be followed strictly. But if you’re an IT pro in the health-care…

1 day ago

Exchange in-place upgrade? Sorry, folks, just say no!

An Exchange in-place upgrade would be a dream come true. But if you try it, you will find yourself trapped…

2 days ago