Windows nista basic network access rule




















You can use SSL encryption in combination with Basic authentication to help secure user account information transmitted across the Internet or a corporate network. The default installation of IIS 7 and later does not include the Basic authentication role service.

To use Basic authentication on Internet Information Services IIS , you must install the role service, disable Anonymous authentication for your Web site or application, and then enable Basic authentication for the site or application. In the Connections pane, expand the server name, expand Sites , and then click the site, application or Web service for which you want to enable basic authentication.

Scroll to the Security section in the Home pane, and then double-click Authentication. In the Authentication pane, select Basic Authentication , and then, in the Actions pane, click Enable. In the Authentication pane, select Anonymous Authentication , and then click Disable in the Actions pane. After you install the role service, IIS 7 commits the following configuration settings to the ApplicationHost.

The following configuration sample enables Basic authentication for a Web site, Web application, or Web service. By default these settings must be included in your ApplicationHost. To change the permissions of a file or folder, follow these steps. Important You must be logged on as an administrator to change permissions on files and folders. Press and hold or right-click the file or folder, and then tap or click Properties.

Tap or click Edit , tap or click your name, select the check boxes for the permissions that you must have, and then click OK. The file or folder may be encrypted Encryption can help protect files and folders from unwanted access.

You cannot open an encrypted file or folder without the certificate that was used to encrypt it. To determine whether a file or folder is encrypted, follow these steps:. Tap or click the General tab, and then tap or click Advanced. If the Encrypt contents to secure data check box is selected, you have to have the certificate that was used to encrypt the file or folder to be able to open it. In this situation, you should obtain the certificate from the person who created or encrypted the file or folder, or have that person decrypt the file or folder.

You may not have ownership of a file or folder If you recently upgraded your computer to Windows 7 from an earlier version of Windows, some of your account information may have changed. To take ownership of a file or a folder, follow these steps:.

Right-click the folder that you want to take ownership of, then click Properties. Click the Security tab, click Advanced , then click the Owner tab. Note If you are prompted for an administrator password or for confirmation, type the password or provide confirmation.

If you want this person to be the owner of files and subfolders in this folder, select the Replace owner on subcontainers and objects check box. To determine the permissions of the file or folder, follow these steps:.

Under Group or user names , click your name to see the permissions that you have. To change permissions on a file or folder, follow these steps.

Click Edit , click your name, select the check boxes for the permissions that you must have, and then click OK. For more information about permissions, see What are permissions?

Click the General tab, then click Advanced. You should obtain the certificate from the person who created or encrypted the file or folder, or have that person decrypt the file or folder. For more information, see Import or export certificates and private keys. Cause A problem that prevents you from accessing or working with files and folders can occur for one or more of the following reasons:.

To check permissions on a file or a folder, follow these steps:. The file or folder may be corrupted Files can become corrupted for several reasons. The most common reason is that you have a file open when your computer crashes or loses power.

Most corrupted files cannot be repaired. In this situation, you should either delete the file or restore the file from a backup copy. For more information about corrupted files and how to fix them, see Corrupted files: frequently asked questions. Your local user profile may be corrupted Occasionally, Windows might not read your local user profile correctly. This may prevent you from accessing files and folders.

In this situation, you may have to use a new local user profile. To create the profile, you must first create a local user account. When the new account is created, the profile is also created. To create a local user account, follow these steps:. Swipe from the right edge of the screen, tap Settings , and then tap Change PC settings. If you are using a mouse, point to the upper-right corner of the screen, move the mouse pointer down, click Settings , and then click Change PC settings.

If you want to use a password, enter and verify the password that you want to use. Windows is no exception to this rule. In order to successfully join a workgroup and use all the available network sharing features, your computer must have a unique computer name. When you connect to a network, you will always receive an IP address.

This concept is similar to the computer name in the sense that it is used to identify your PC or device on the network and provide a unique address where other computers or devices can find it. IP addresses are binary numbers but they are displayed in human-readable notations, such as In a home network, the IP addresses are automatically given to every device or PC by the router, when the network connection is established. There are several ways to learn the IP address of your computer.

A list is displayed with all your network adapters and their properties. There you will see the IP address you have for your active network connection. While browsing the network, you can find computers by using both their IP address and their computer name.

A network profile or network location is a collection of network and sharing settings that are applied to your active network connection. Each time you connect to a new network in Windows 7, you are asked to select a location for it. The available choices are home, work and public. Depending on the location you assign, features such as file and printer sharing, network discovery, and others might be turned on or off.

In Windows 8. When connecting to a new network, you are asked to decide whether you want to find PCs, devices, and content on your network. Network locations are very useful on laptops and tablets. If you travel a lot, you will connect to a lot of different networks. With one simple setting, Windows will automatically adjust the location assigned to each network connection and all the relevant network sharing settings. Remember, in Windows 8. The Homegroup is protected with a password but you need to type it only when first joining it.

As you will see in lesson 4, setting up sharing with the Homegroup is much faster than traditional network sharing in Windows Vista or Windows XP. There you will find a line named HomeGroup. In this article. Create a rule that allows a program to send any outbound network traffic on any port it requires. Create an Outbound Program or Service Rule. Create an Outbound Port Rule. Enable a predefined rule or a group of predefined rules.



0コメント

  • 1000 / 1000