Skip to main content

How to create a secure Guest Account

If you’re going to create a Guest account and have some ideas to restrict the account in certain parameters, this article will be very useful for you. Moreover, you can configure the Guest account on a specific Computer or Computers and can control how the account should be used. Follow the following practices when you create a secure Guest account.

Enable the Guest account for use:
It is required to enable the Guest account manually to make it available as by default it is disabled. If you want to enable it, just access the Local Users and Groups in Computer Management, and then select the Users folder, double click on Guest and then clear the Account is Disabled check box. Then, click OK.

Set a secure password for the Guest account:
After creating the Account, it is required to set a secured password. By default, the Guest account is assigned a blank password. Therefore, you can manually set a password on the Computer to improve the security. In Local Users and Groups, right click on Guest and then select Set Password. Now, click Proceed at the warning prompt. Then, type the new Password and then confirm it again. Click on the OK option twice.

Ensure that the Guest account cannot be used over the network:

If the Guest Account is not accessible from other Computer, users on another Computer can log on over the Network as a guest. If you want to prevent it, just start the Local Security Policy tool from the Administrative Tools menu. Instead, you may type secpol.msc at the Command Prompt.  Then, under Local Policies\User Rights Assignment, it is required to check that the Deny Access To This Computer From The Network Policy lists Guest as a restricted account.

Prevent the Guest account from shutting down the computer:
If a Computer is shutting down or starting up, it is possible that a Guest User could gain unauthorized access to the Computer. If you want to turn OFF this, you have to make sure that the Guest Account doesn’t have the Shut Down The System user right. Therefore, open the Local Security Policy Tool, expand the Local Policies\User Rights Assignment and ensure that the Shut Down The System Policy doesn’t list the Guest Account.

Prevent the Guest account from viewing event logs:

At the same time, if you want to help maintain the Security of the System, the Guest account shouldn’t be allowed to view the event logs. If you want to make sure about this, open the Registry Editor by typing “regedit” at the Command Prompt and then navigate to the HKLM\SYSTEM\Cur-rentControlSet\services\Eventlog key.
Now, you can find three important subkeys: Application, Security and System. Moreover, it is required to confirm each of these Subkeys has a DWORD value named RestricGuestAccess with a value of 1.

By

Popular posts from this blog

New Micro battery, power packed for high performance

For a size of a few millimetres, the new micro-batteries are powerful enough to jump start a car battery and then quickly charge the cell phone. Researchers from the University of Illinois have developed the micro batteries which can be used to drive compact electronic devices and new applications for radio communications. The micro batteries are so good that they can even out power the super capacitors. The results were published in ‘Nature Communications’ in the April 16 issue. The micro batteries have energy and power and with the researchers tweaking the structure of the micro batteries a little bit, its use can be for wide range applications.

The high performance of the micro battery is based on its 3-dimensional micro-structure. Based on the design of fast charging cathode by Professor Paul Braun’s group, researchers developed the matching anode and integrated it with the fast charging cathode at a micro-scale and made a complete battery with high performance. These batteries cou…

HTC Touch Diamond SmartPhone!

The phones design is an innovative in which the user has the geometric form language to make sure a clutter-free environment for screening content. The San Francisco based studio One & Co collaborated with HTC Taiwan Design team to create Diamond HTC smartphone.







The HTC phone is quite wonderful with design and the rapid development in the smartphone market the HTC has taken innovative steps to capture the SmartPhone market HTC develops these kind of new inventive designs.
Inspired

How to Automatically Convert any RSS Feed to an iPhone Web app!

For iPhone users this is another web app which converts any well formed XML RSS feed to an iPhone version. It is possible because it is worked with the typical sliding style interface to suit the iPhone optimized version. For instance if you had the iPhone right now here is the Google News Feed




Jim Liddle, one of the creators of the service, told iPhone Atlas “You can book mark the generated site and use it to host your own content and reference it from your own. It seems that these feed on your iPhone is quiet usable.