SMSMS

Posts Tagged ‘policy’

Windows 7 Policy-based QoS

Although, the cost of bandwidth is much cheaper now-a-days, you cannot throw more bandwidth to applications to solve network congestion problems without controlling the consumption by the various bandwidth-hungry applications! As the trend of multimedia streaming and real-time networking is increasing at an extraordinary pace, network congestion problems will occur as these applications tend to consume all available bandwidth.

Read more…

Share

Be the first to comment - What do you think?  Posted by George - April 3, 2012 at 2:49 am

Categories: Networking   Tags: , , , , , , , , ,

Network and Sharing Center’s Network Map

By default, Windows 7 only displays a full network map in the Network and Sharing Center if you’re connected to a Private network. The network map is a graphical view of the computers and devices on your network that shows how they’re connected. However, you can turn the mapping feature on when connected to Domain and Public networks as well.

Read more…

1 comment - What do you think?  Posted by George - October 19, 2011 at 2:27 am

Categories: Networking   Tags: , , , , , ,

Using Smart Cards with Windows 7

In highly secure environments where Smart Cards are the preferred method for authentication, Windows 7 is the system that allows you to use Smart Cards without requiring any specific vendor software. In addition, Windows 7 allows you to fine tune the authentication mechanism through the use of policies. Why Smart Cards? Smart Cards are more secure than other means of authentication such as user names and passwords. They store digital certificates where an administrator can immediately revoke the certificate stored on a lost or stolen Smart Card from the system.

Read more…

Be the first to comment - What do you think?  Posted by George - October 2, 2011 at 5:27 am

Categories: Devices, Security   Tags: , , , , , , , , ,

Software Restriction Policies

In most organizations the majority number of employees runs the same applications and it is quite normal to find a list of approved applications. Apart, from disallowing standard users (non administrator privileges) to install any unapproved applications some IT policies dictate that some applications although required to be present on the computer for administration purposes, standard users are not allowed to execute them. For example, you may want to block admin scripts and specific DLLs from running. You can achieve this with help of Group Policies – Software Restriction Policies.

Read more…

7 comments - What do you think?  Posted by George - November 20, 2010 at 2:56 am

Categories: Security   Tags: , , , , , , , ,