Security Policy of Microsoft® Windows® 7
What are the features and components of security policy of Windows 7?
Security policy of Windows 7 helps in implementing many system, user and security-related settings including password policy, audit policy and user rights. Most of the settings in Windows 7 are fine by default. Certain settings are inoperable or inaccessible by other computers in your home network in case if you do not know what you are doing. You could use Security Policy Console to modify the behavior of UAC. In order to modify it, go to Start Local Security Policy (Secpol.msc) and open Security then select Settings, after that go to Local Policies and then Security Options. In the details pane, scroll down to the policies whose names begin with “User Account Control”. Then double-click it and click the 'Explain Tab' for information before you decide on a setting. You can make several refinements in the way UAC works. Security Policy enable you to access the control over the security policies on your computer. A strong password is good as the attackers will not be able to guess it easily. Anyone can enter any password any number of times without getting stopped by Windows 7. Such performance is called brute-force attack and you can stop it by creating Account Lockout Policy. So, when you enter a wrong password several times, his/her account will be protected only at a specified period of time.
Following are the different component and features of security policy in Windows 7:
- Account policies
- Advanced audit policy
- Application control policy
Account policies help you to control password and account lockout policies. It also helps you to configure auditing, user rights and security option policies. Advanced security option in Windows firewall provides your computer with network security. The two areas under the control of these settings are encryption of the file system and the BitLocker Drive Encryption Software.
Advanced audit policy
Advanced audit policy configuration provides you detailed control over audit policies. The identification of attempted or successful attacks on your network and resources is considered. It verifies the execution of rules governing the management of critical organizational assets.
Application control policy gives you control over the AppLocker application which uses rules and the properties of files to give access control for applications. The Network List Manager Policies supports the identification of networks of those that you connect to and handling of those that cannot be identified. Public key policies deals with the encryption.
iYogi is the fastest growing online and remote tech support provider in the direct-to-consumers and small businesses sector. Our highly skilled and experienced tech experts available, 24x7x365 will provide the best issue resolution and customer satisfaction. Our award winning and low priced Annual Subscription covers the following services:
- Comprehensive support for security policy of Windows 7.
- Diagnostic & repair for your technologies.
- Troubleshoot software errors.
- Update drivers and security to protect against online threats.
- Connect to Internet, devices and peripherals.
- Optimize your computer’s speed and performance.
Unlimited access to great tech support, all year around! We promise the lowest wait-time and highest resolution rate in the industry.