CompTIA Security_ Deluxe Study Guide_ SY0-201 - Emmett Dulaney [280]
2. Click the Security tab (if this tab does not appear, see Exercise B.21).
3. Click the Advanced button.
4. Click the Effective Permissions tab.
5. Click the Select button and type in a username; then press Enter. The permissions that appear are now those that would apply for that user on that resource.
6. Click OK to exit. Click OK again at the Properties dialog box.
Lab B.23: Turn the Guest Account Off
This lab requires a Windows XP workstation.
The Guest account is used when someone must access a system but lacks a user account on that system. The Guest account leaves a security risk at the workstation and should be disabled.
To turn the Guest account off, follow these steps:
1. Choose Start Control Panel User Accounts.
2. Click Guest. The dialog box shown in Figure B.6 appears.
FIGURE B.6 The options for the Guest account
3. Click Turn Off the Guest Account.
4. Exit the User Accounts dialog box.
5. Exit Control Panel.
Lab B.24: View Internet Explorer Security Settings
This lab requires a workstation running Internet Explorer.
A great many security threats come through the Internet, and the browser is the interface most commonly used to reach the Internet, making the security settings for the browser critically important. To view the security settings for Internet Explorer, follow these steps:
1. Within Internet Explorer, click Tools Internet Options.
2. Choose the Security tab.
3. Chose the Internet icon, and then click the Custom level button.
4. Choose to enable or disable any settings, then click OK to exit.
5. Click OK to exit the Internet Options dialog box.
Lab B.25: Change Internet Explorer Pop-up Blocker Settings
This lab requires a workstation running Internet Explorer.
To view and change the pop-up blocker settings for Internet Explorer, follow these steps:
1. Within Internet Explorer, click Tools Internet Options.
2. Choose the Privacy tab.
3. Make certain the box is checked to turn on pop-up blocking.
4. Click Settings. The dialog box shown in Figure B.7 appears.
5. Type in the address of a site from which you want to allow pop-ups, and then click Add.
6. When you are finished adding sites, click Close.
7. Click OK to exit the Internet Options dialog box.
FIGURE B.7 Configure sites to allow pop-ups from within the Pop-up Blocker Settings dialog box.
Lab B.26: Prevent a Folder from Being Shared
This lab requires a workstation running a current Windows-based operating system.
Folders can be marked as Private to prevent them from being shared or accessed by anyone but you locally. To mark folders as Private, follow these steps:
1. Within Windows Explorer, right-click a folder and choose Properties from the pop-up menu.
2. Choose the Sharing tab.
3. Check the Make This Folder Private box.
4. Click OK.
5. When you are finished, close Windows Explorer.
Lab B.27: Enable openSUSE Firewall
This lab requires a workstation running openSUSE and KDE.
You can start and configure the firewall in openSUSE by following these steps:
1. Click the launcher on the desktop and choose Applications.
2. Choose System.
3. Choose Administrator Settings. This choice starts YaST2.
4. Choose Security and Users.
5. Choose Firewall. The Firewall Configuration dialog box appears.
6. Choose Enable Firewall Automatic Starting. If the firewall is not currently running, click Start Firewall Now (if the firewall is running, this option will be grayed out and you will not be able to click it).
7. Click Next to see the summary screen.
8. Click Finish to exit the firewall configuration.
9. Exit YaST2.
Lab B.28: Configure enSUSE Local Security
This lab requires a workstation running openSUSE and KDE.
To configure local security in openSUSE, follow these steps:
1. Click the launcher on the desktop and choose Applications.
2. Choose System.
3. Choose Administrator Settings. This choice starts YaST2.
4. Choose Security and Users.
5. Choose Local Security.