Tip

Sleep well with proper user profiles

Sleep well with proper user profiles
Adesh Rampat

Security breaches can cause lots of sleepless nights. So it's important, when setting up profiles for network users that you examine security related issues of each profile and apply the one that works in conjunction with the company's security policy. The most common profiles are local and roaming.

Local Profile

With local profile all user and configuration settings remain on the workstation

Advantages:

  • Securing configuration settings is not an issue because the profile is stored locally.
  • No server storage space is required
  • There are no bandwidth issues

Disadvantages:

  • Since profiles are locally stored it may be difficult for to establish change-control policies globally.

Roaming profile:

With roaming profile all user and configuration settings reside on the network server.

Advantages:

  • Establishing security policies and scripting is much more efficient.
  • You do not have to spend time in setting up restrictions.
  • User can log on to other workstations and still use current settings

Disadvantages:

Requires Free Membership to View

  • Requires server storage space. If there are many users with settings that include .bmp files this can utilize a large amount of storage space.
  • Bandwidth becomes an issue, especially with many users logging on at the same time
  • Roaming profiles can create a security risk especially if the user profile points to a folder that may store confidential information on the network server. Unauthorized personnel can easily access this information if the user fails to log off.

Consider the implications of each profile options before implementation. One possible option can be to use roaming profiles for users who may not be using a workstation on a daily basis.


Adesh Rampat is a member of the Association of Internet Professionals, the Institute for Network Professionals, and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Did you like this tip? If so, (or if not) why not let us know. Send an email to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.

Related Book

Programming Windows Security
Author : Keith Brown
Publisher : Addison Wesley
Published : Jun 2000
Summary :
Windows security has often been considered a dry and unapproachable topic. For years, the main examples of programming security were simply exercises in ACL manipulation. Programming Windows Security is a revelation providing developers with insight into the way Windows security really works. This book shows developers the essentials of security in Windows 2000, including coverage of Kerberos, SSL, job objects, the new ACL model, COM+ and IIS 5.0. Also included are highlights of the differences between security in Windows 2000 and in Windows NT 4.0.


This was first published in April 2001

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.